Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/mozjs78-78.4.0/build/clang-plugin/alpha/tests/TestTempRefPtr.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/alpha/TempRefPtrChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/alpha/TempRefPtrChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/FileOperations.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/FileOperations.h
Examining data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/JSONFormatter.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/JSONFormatter.h
Examining data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/MozsearchIndexer.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/StringOperations.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/StringOperations.h
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/NonParameterTestCases.h
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestAssertWithAssignment.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestBadImplicitConversionCtor.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestCanRunScript.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestCustomHeap.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestDanglingOnTemporary.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestExplicitOperatorBool.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestFopenUsage.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestGlobalClass.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestHeapClass.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestInheritTypeAnnotationsFromTemplateArgs.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestKungFuDeathGrip.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestLoadLibraryUsage.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestMultipleAnnotations.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestMustOverride.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestMustReturnFromCaller.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestMustUse.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNANTestingExpr.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNANTestingExprC.c
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNeedsNoVTableType.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNoAddRefReleaseOnReturn.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNoArithmeticExprInArgument.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNoAutoType.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNoDuplicateRefCntMember.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNoExplicitMoveConstructor.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNoNewThreadsChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNoPrincipalGetUri.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNoRefcountedInsideLambdas.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNoUsingNamespaceMozillaJava.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNonHeapClass.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNonMemMovable.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNonMemMovableStd.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNonMemMovableStdAtomic.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNonParameterChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNonTemporaryClass.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestNonTrivialTypeInFfi.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestOverrideBaseCall.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestOverrideBaseCallAnnotation.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestParamTraitsEnum.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestRefCountedCopyConstructor.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestSprintfLiteral.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestStackClass.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestStaticLocalClass.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestTemporaryClass.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestTrivialCtorDtor.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/tests/TestTrivialDtor.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/ArithmeticArgChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/ArithmeticArgChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/AssertAssignmentChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/AssertAssignmentChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/BaseCheck.h
Examining data/mozjs78-78.4.0/build/clang-plugin/CanRunScriptChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/CanRunScriptChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/CustomAttributes.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/CustomAttributes.h
Examining data/mozjs78-78.4.0/build/clang-plugin/CustomMatchers.h
Examining data/mozjs78-78.4.0/build/clang-plugin/CustomTypeAnnotation.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/CustomTypeAnnotation.h
Examining data/mozjs78-78.4.0/build/clang-plugin/DanglingOnTemporaryChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/DanglingOnTemporaryChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/DiagnosticsMatcher.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/DiagnosticsMatcher.h
Examining data/mozjs78-78.4.0/build/clang-plugin/ExplicitImplicitChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/ExplicitImplicitChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/ExplicitOperatorBoolChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/ExplicitOperatorBoolChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/FopenUsageChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/FopenUsageChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/KungFuDeathGripChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/KungFuDeathGripChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/LoadLibraryUsageChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/LoadLibraryUsageChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/MemMoveAnnotation.h
Examining data/mozjs78-78.4.0/build/clang-plugin/MozCheckAction.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/MozillaTidyModule.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/MustOverrideChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/MustOverrideChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/MustReturnFromCallerChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/MustReturnFromCallerChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/MustUseChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/MustUseChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NaNExprChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NaNExprChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NeedsNoVTableTypeChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NeedsNoVTableTypeChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NoAddRefReleaseOnReturnChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NoAddRefReleaseOnReturnChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NoAutoTypeChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NoAutoTypeChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NoDuplicateRefCntMemberChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NoDuplicateRefCntMemberChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NoExplicitMoveConstructorChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NoExplicitMoveConstructorChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NoNewThreadsChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NoNewThreadsChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NoPrincipalGetURI.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NoPrincipalGetURI.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NoUsingNamespaceMozillaJavaChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NoUsingNamespaceMozillaJavaChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NonMemMovableMemberChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NonMemMovableMemberChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NonMemMovableTemplateArgChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NonMemMovableTemplateArgChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NonParamInsideFunctionDeclChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NonParamInsideFunctionDeclChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/NonTrivialTypeInFfiChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/NonTrivialTypeInFfiChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/OverrideBaseCallChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/OverrideBaseCallChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/OverrideBaseCallUsageChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/OverrideBaseCallUsageChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/ParamTraitsEnumChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/ParamTraitsEnumChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/RecurseGuard.h
Examining data/mozjs78-78.4.0/build/clang-plugin/RefCountedCopyConstructorChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/RefCountedCopyConstructorChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/RefCountedInsideLambdaChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/RefCountedInsideLambdaChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/ScopeChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/ScopeChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/SprintfLiteralChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/SprintfLiteralChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/StmtToBlockMap.h
Examining data/mozjs78-78.4.0/build/clang-plugin/ThirdPartyPaths.h
Examining data/mozjs78-78.4.0/build/clang-plugin/TrivialCtorDtorChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/TrivialCtorDtorChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/TrivialDtorChecker.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/TrivialDtorChecker.h
Examining data/mozjs78-78.4.0/build/clang-plugin/Utils.h
Examining data/mozjs78-78.4.0/build/clang-plugin/VariableUsageHelpers.cpp
Examining data/mozjs78-78.4.0/build/clang-plugin/VariableUsageHelpers.h
Examining data/mozjs78-78.4.0/build/clang-plugin/plugin.h
Examining data/mozjs78-78.4.0/build/macosx/permissions/chown_revert.c
Examining data/mozjs78-78.4.0/build/macosx/permissions/chown_root.c
Examining data/mozjs78-78.4.0/build/pymake/tests/pathdir/src/pathtest.cpp
Examining data/mozjs78-78.4.0/build/unix/elfhack/dummy.c
Examining data/mozjs78-78.4.0/build/unix/elfhack/elf.cpp
Examining data/mozjs78-78.4.0/build/unix/elfhack/elfhack.cpp
Examining data/mozjs78-78.4.0/build/unix/elfhack/elfxx.h
Examining data/mozjs78-78.4.0/build/unix/elfhack/inject.c
Examining data/mozjs78-78.4.0/build/unix/elfhack/test-array.c
Examining data/mozjs78-78.4.0/build/unix/elfhack/test-ctors.c
Examining data/mozjs78-78.4.0/build/unix/elfhack/test.c
Examining data/mozjs78-78.4.0/build/unix/stdc++compat/stdc++compat.cpp
Examining data/mozjs78-78.4.0/build/win32/crashinjectdll/crashinjectdll.cpp
Examining data/mozjs78-78.4.0/build/win32/crashinject.cpp
Examining data/mozjs78-78.4.0/config/external/nspr/_pl_bld.h
Examining data/mozjs78-78.4.0/config/external/nspr/_pr_bld.h
Examining data/mozjs78-78.4.0/config/external/nspr/prcpucfg.h
Examining data/mozjs78-78.4.0/config/external/rlbox/rlbox_config.h
Examining data/mozjs78-78.4.0/config/external/rlbox/rlbox_thread_locals.cpp
Examining data/mozjs78-78.4.0/config/external/rlbox_lucet_sandbox/rlbox_lucet_thread_locals.cpp
Examining data/mozjs78-78.4.0/config/gcc-stl-wrapper.template.h
Examining data/mozjs78-78.4.0/config/gcc_hidden.h
Examining data/mozjs78-78.4.0/config/msvc-stl-wrapper.template.h
Examining data/mozjs78-78.4.0/config/nsinstall.c
Examining data/mozjs78-78.4.0/config/pathsub.c
Examining data/mozjs78-78.4.0/config/pathsub.h
Examining data/mozjs78-78.4.0/config/windows-h-constant.decls.h
Examining data/mozjs78-78.4.0/config/windows-h-unicode.decls.h
Examining data/mozjs78-78.4.0/config/windows-h-wrapper.template.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/appendable.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/brkiter.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/bytestream.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/bytestrie.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/bytestriebuilder.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/caniter.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/casemap.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/char16ptr.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/chariter.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/dbbi.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/docmain.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/dtintrv.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/edits.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/enumset.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/errorcode.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/filteredbrk.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/icudataver.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/icuplug.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/idna.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/localebuilder.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/localematcher.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/localpointer.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/locdspnm.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/locid.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/messagepattern.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/normalizer2.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/normlzr.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/parseerr.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/parsepos.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/platform.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ptypes.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/putil.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/rbbi.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/rep.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/resbund.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/schriter.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/simpleformatter.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/std_string.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/strenum.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/stringoptions.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/stringpiece.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/stringtriebuilder.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/symtable.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ubidi.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ubiditransform.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ubrk.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucasemap.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucat.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uchar.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucharstrie.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucharstriebuilder.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uchriter.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uclean.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucnv.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucnv_cb.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucnv_err.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucnvsel.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uconfig.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucpmap.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucptrie.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ucurr.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/udata.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/udisplaycontext.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uenum.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uidna.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uiter.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uldnames.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uloc.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/umachine.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/umisc.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/umutablecptrie.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/unifilt.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/unifunct.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/unimatch.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uniset.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/unistr.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/unorm.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/unorm2.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uobject.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/urename.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/urep.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ures.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uscript.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uset.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/usetiter.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ushape.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/usprep.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ustring.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/ustringtrie.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/utext.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/utf.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/utf16.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/utf32.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/utf8.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/utf_old.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/utrace.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/utypes.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uvernum.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unicode/uversion.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/appendable.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/bmpset.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/bmpset.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/brkeng.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/brkeng.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/brkiter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/bytesinkutil.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/bytesinkutil.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/bytestream.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/bytestrie.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/bytestriebuilder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/bytestrieiterator.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/caniter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/capi_helper.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/characterproperties.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/chariter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/charstr.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/charstr.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/cmemory.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/cmemory.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/cpputils.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/cstr.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/cstr.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/cstring.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/cstring.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/cwchar.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/cwchar.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/dictbe.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/dictbe.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/dictionarydata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/dictionarydata.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/dtintrv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/edits.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/errorcode.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/filteredbrk.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/filterednormalizer2.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/hash.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/icudataver.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/icuplug.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/icuplugimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/loadednormalizer2impl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/localebuilder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/localematcher.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/localeprioritylist.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/localeprioritylist.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/localsvc.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/locavailable.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/locbased.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/locbased.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/locdispnames.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/locdistance.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/locdistance.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/locdspnm.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/locid.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/loclikely.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/loclikelysubtags.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/loclikelysubtags.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/locmap.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/locmap.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/locresdata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/locutil.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/locutil.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/lsr.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/lsr.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/messageimpl.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/messagepattern.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/msvcres.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/mutex.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/norm2_nfc_data.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/norm2allmodes.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/normalizer2.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/normalizer2impl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/normalizer2impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/normlzr.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/parsepos.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/patternprops.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/patternprops.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/pluralmap.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/pluralmap.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/propname.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/propname.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/propname_data.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/propsvec.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/propsvec.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/punycode.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/punycode.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/putilimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbi.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbi_cache.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbi_cache.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbidata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbidata.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbinode.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbinode.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbirb.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbirb.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbirpt.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbiscan.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbiscan.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbisetb.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbisetb.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbistbl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbitblb.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/rbbitblb.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/resbund.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/resbund_cnv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/resource.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/resource.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/restrace.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/restrace.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ruleiter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ruleiter.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/schriter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/serv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/serv.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/servlk.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/servlkf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/servloc.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/servls.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/servnotf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/servnotf.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/servrbf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/servslkf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/sharedobject.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/sharedobject.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/simpleformatter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/sprpimpl.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/static_unicode_sets.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/static_unicode_sets.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/stringpiece.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/stringtriebuilder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uarrsort.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uarrsort.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uassert.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubidi.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubidi_props.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubidi_props.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubidi_props_data.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubidiimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubidiln.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubiditransform.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubidiwrt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubrk.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ubrkimpl.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucase.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucase.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucase_props_data.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucasemap.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucasemap_imp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucasemap_titlecase_brkiter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucat.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uchar.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uchar_props_data.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucharstrie.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucharstriebuilder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucharstrieiterator.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uchriter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucln.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucln_cmn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucln_cmn.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucln_imp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucmndata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucmndata.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv2022.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_bld.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_bld.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_cb.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_cnv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_cnv.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_ct.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_err.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_ext.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_ext.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_imp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_io.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_io.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_lmb.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_set.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_u16.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_u32.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_u7.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnv_u8.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnvbocu.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnvdisp.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnvhz.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnvisci.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnvlat1.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnvmbcs.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnvmbcs.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnvscsu.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucnvsel.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucol_data.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucol_swp.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucol_swp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucptrie.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucptrie_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ucurrimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/udata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/udatamem.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/udatamem.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/udataswp.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/udataswp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uelement.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uenum.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uenumimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uhash.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uhash.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uhash_us.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uidna.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uinit.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uinvchar.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uinvchar.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uiter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ulayout_props.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ulist.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ulist.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uloc.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uloc_keytype.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uloc_tag.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ulocimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/umapfile.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/umapfile.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/umath.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/umutablecptrie.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/umutex.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/umutex.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unames.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unifiedcache.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unifiedcache.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unifilt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unifunct.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uniset.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uniset_closure.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uniset_props.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unisetspan.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unisetspan.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unistr.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unistr_case.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unistr_case_locale.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unistr_cnv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unistr_props.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unistr_titlecase_brkiter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unistrappender.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/unorm.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unormcmp.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/unormimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uobject.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uposixdefs.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uprops.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uprops.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ures_cnv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uresbund.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uresdata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uresdata.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uresimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ureslocs.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/usc_impl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/usc_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uscript.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uscript_props.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uset.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uset_imp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uset_props.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/usetiter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ushape.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/usprep.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustack.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustr_cnv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustr_cnv.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustr_imp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustr_titlecase_brkiter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustr_wcs.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustrcase.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustrcase_locale.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustrenum.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustrenum.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustrfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustrfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustring.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/ustrtrns.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/utf_impl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/util.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/util.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/util_props.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/utrace.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/utracimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/utrie.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/utrie.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/utrie2.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/utrie2.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/utrie2_builder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/utrie2_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/utrie_swap.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uts46.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/utypeinfo.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/utypes.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uvector.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uvector.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uvectr32.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uvectr32.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/uvectr64.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/uvectr64.h
Examining data/mozjs78-78.4.0/intl/icu/source/common/wintz.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/common/wintz.h
Examining data/mozjs78-78.4.0/intl/icu/source/extra/scrptrun/scrptrun.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/extra/scrptrun/scrptrun.h
Examining data/mozjs78-78.4.0/intl/icu/source/extra/scrptrun/srtest.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/extra/uconv/unicode/uwmsg.h
Examining data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uconv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uwmsg.c
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/alphaindex.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/basictz.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/calendar.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/choicfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/coleitr.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/coll.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/compactdecimalformat.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/curramt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/currpinf.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/currunit.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/datefmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/dcfmtsym.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/decimfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/dtfmtsym.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/dtitvfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/dtitvinf.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/dtptngen.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/dtrule.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/fieldpos.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/fmtable.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/format.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/formattedvalue.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/fpositer.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/gender.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/gregocal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/listformatter.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/measfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/measunit.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/measure.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/msgfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/nounit.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/numberformatter.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/numberrangeformatter.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/numfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/numsys.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/plurfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/plurrule.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/rbnf.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/rbtz.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/regex.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/region.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/reldatefmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/scientificnumberformatter.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/search.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/selfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/simpletz.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/smpdtfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/sortkey.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/stsearch.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/tblcoll.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/timezone.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/tmunit.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/tmutamt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/tmutfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/translit.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/tzfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/tznames.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/tzrule.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/tztrans.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/ucal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/ucol.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/ucoleitr.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/ucsdet.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/udat.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/udateintervalformat.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/udatpg.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/ufieldpositer.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/uformattable.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/uformattedvalue.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/ugender.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/ulistformatter.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/ulocdata.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/umsg.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/unirepl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/unum.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/unumberformatter.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/unumsys.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/upluralrules.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/uregex.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/uregion.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/ureldatefmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/usearch.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/uspoof.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/utmscale.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/utrans.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/vtzone.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/alphaindex.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/anytrans.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/anytrans.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/astro.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/astro.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/basictz.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/bocsu.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/bocsu.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/brktrans.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/brktrans.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/buddhcal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/buddhcal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/calendar.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/casetrn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/casetrn.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/cecal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/cecal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/chnsecal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/chnsecal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/choicfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/coleitr.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/coll.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collation.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collation.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationbuilder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationbuilder.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationcompare.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationcompare.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationdata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationdata.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationdatabuilder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationdatabuilder.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationdatareader.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationdatareader.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationdatawriter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationdatawriter.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationfastlatin.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationfastlatin.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationfastlatinbuilder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationfastlatinbuilder.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationfcd.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationfcd.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationiterator.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationiterator.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationkeys.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationkeys.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationroot.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationroot.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationrootelements.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationrootelements.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationruleparser.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationruleparser.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationsets.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationsets.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationsettings.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationsettings.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationtailoring.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationtailoring.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationweights.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collationweights.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/collunsafe.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/compactdecimalformat.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/coptccal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/coptccal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/cpdtrans.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/cpdtrans.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csdetect.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csdetect.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csmatch.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csmatch.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csr2022.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csr2022.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrecog.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrecog.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrmbcs.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrmbcs.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrsbcs.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrsbcs.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrucode.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrucode.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrutf8.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/csrutf8.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/curramt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/currfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/currfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/currpinf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/currunit.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dangical.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dangical.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/datefmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dayperiodrules.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dayperiodrules.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dcfmtsym.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/decContext.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/decContext.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/decNumber.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/decNumber.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/decNumberLocal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/decimfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-bignum-dtoa.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-bignum-dtoa.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-bignum.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-bignum.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-cached-powers.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-cached-powers.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-diy-fp.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-double-to-string.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-double-to-string.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-fast-dtoa.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-fast-dtoa.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-ieee.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-string-to-double.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-string-to-double.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-strtod.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-strtod.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-utils.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dt_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dtfmtsym.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dtitv_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvinf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dtptngen.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dtptngen_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/dtrule.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/erarules.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/erarules.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/esctrn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/esctrn.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ethpccal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ethpccal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/fmtable.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/fmtable_cnv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/fmtableimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/format.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/formatted_string_builder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/formatted_string_builder.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/formattedval_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/formattedval_iterimpl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/formattedval_sbimpl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/formattedvalue.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/fphdlimp.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/fphdlimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/fpositer.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/funcrepl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/funcrepl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/gender.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/gregocal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/gregoimp.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/gregoimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/hebrwcal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/hebrwcal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/indiancal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/indiancal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/inputext.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/inputext.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/islamcal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/islamcal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/japancal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/japancal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/listformatter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/measfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/measunit.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/measunit_extra.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/measunit_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/measure.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/msgfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/msgfmt_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/name2uni.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/name2uni.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nfrlist.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nfrs.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nfrs.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nfrule.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nfrule.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nfsubs.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nfsubs.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nortrans.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nortrans.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nounit.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nultrans.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/nultrans.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_affixutils.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_affixutils.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_asformat.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_asformat.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_capi.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_compact.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_compact.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_currencysymbols.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_currencysymbols.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_decimalquantity.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_decimalquantity.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_decimfmtprops.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_decimfmtprops.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_decnum.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_fluent.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_formatimpl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_formatimpl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_grouping.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_integerwidth.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_longnames.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_longnames.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_mapper.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_mapper.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_microprops.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_modifiers.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_modifiers.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_multiplier.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_multiplier.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_notation.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_output.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_padding.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_patternmodifier.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_patternmodifier.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_patternstring.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_patternstring.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_rounding.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_roundingutils.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_scientific.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_scientific.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_skeletons.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_skeletons.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_types.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_utils.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_utils.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/number_utypes.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_affixes.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_affixes.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_compositions.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_compositions.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_currency.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_currency.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_decimal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_decimal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_impl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_parsednumber.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_scientific.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_scientific.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_symbols.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_symbols.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_types.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_utils.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_validators.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numparse_validators.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numrange_fluent.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numrange_impl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numrange_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numsys.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/numsys_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/olsontz.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/olsontz.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/persncal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/persncal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/plurfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/plurrule.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/plurrule_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/quant.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/quant.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/quantityformatter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/quantityformatter.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbnf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt_data.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt_data.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt_pars.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt_pars.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt_rule.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt_rule.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt_set.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbt_set.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rbtz.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/regexcmp.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/regexcmp.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/regexcst.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/regeximp.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/regeximp.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/regexst.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/regexst.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/regextxt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/regextxt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/region.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/region_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/reldatefmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/reldtfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/reldtfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rematch.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/remtrans.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/remtrans.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/repattrn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/rulebasedcollator.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/scientificnumberformatter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/scriptset.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/scriptset.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/search.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/selfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/selfmtimpl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/sharedbreakiterator.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/sharedbreakiterator.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/sharedcalendar.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/shareddateformatsymbols.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/sharednumberformat.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/sharedpluralrules.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/simpletz.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/smpdtfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/smpdtfst.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/smpdtfst.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/sortkey.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/standardplural.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/standardplural.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/string_segment.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/string_segment.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/strmatch.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/strmatch.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/strrepl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/strrepl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/stsearch.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/taiwncal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/taiwncal.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/timezone.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/titletrn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/titletrn.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tmunit.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tmutamt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tmutfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tolowtrn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tolowtrn.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/toupptrn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/toupptrn.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/translit.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/transreg.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/transreg.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tridpars.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tridpars.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tzfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tzgnames.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tzgnames.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tznames.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tznames_impl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tznames_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tzrule.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/tztrans.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ucal.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ucln_in.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ucln_in.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ucol.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ucol_imp.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ucol_res.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ucol_sit.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ucoleitr.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ucsdet.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/udat.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/udateintervalformat.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/udatpg.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ufieldpositer.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uitercollationiterator.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uitercollationiterator.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ulistformatter.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ulocdata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/umsg.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/umsg_imp.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unesctrn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unesctrn.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uni2name.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uni2name.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unum.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/unumsys.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/upluralrules.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uregex.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uregexc.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uregion.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/usearch.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uspoof.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uspoof_build.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uspoof_conf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uspoof_conf.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uspoof_impl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/uspoof_impl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/usrchimp.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/utf16collationiterator.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/utf16collationiterator.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/utf8collationiterator.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/utf8collationiterator.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/utmscale.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/utrans.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/vtzone.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/vzone.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/vzone.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/windtfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/windtfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/winnmfmt.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/winnmfmt.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/wintzimpl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/wintzimpl.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/zonemeta.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/zonemeta.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/zrule.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/zrule.h
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ztrans.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/i18n/ztrans.h
Examining data/mozjs78-78.4.0/intl/icu/source/io/unicode/ustdio.h
Examining data/mozjs78-78.4.0/intl/icu/source/io/unicode/ustream.h
Examining data/mozjs78-78.4.0/intl/icu/source/io/locbund.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/locbund.h
Examining data/mozjs78-78.4.0/intl/icu/source/io/sprintf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/sscanf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/ucln_io.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/ucln_io.h
Examining data/mozjs78-78.4.0/intl/icu/source/io/ufile.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/ufile.h
Examining data/mozjs78-78.4.0/intl/icu/source/io/ufmt_cmn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/ufmt_cmn.h
Examining data/mozjs78-78.4.0/intl/icu/source/io/uprintf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/uprintf.h
Examining data/mozjs78-78.4.0/intl/icu/source/io/uprntf_p.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/uscanf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/uscanf.h
Examining data/mozjs78-78.4.0/intl/icu/source/io/uscanf_p.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/ustdio.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/io/ustream.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/stubdata/stubdata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/unicode/ctest.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/unicode/datamap.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/unicode/testdata.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/unicode/testlog.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/unicode/testtype.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/unicode/tstdtmod.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/unicode/uperf.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/unicode/utimer.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/datamap.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/testdata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/tstdtmod.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ucln_ct.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/uperf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/cptbl.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/escapesrc.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/expect-simple.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/tblgen.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/test-nochange.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/test-simple.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genbrk/genbrk.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genccode/genccode.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gencfu/gencfu.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gencmn/gencmn.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gencnval/gencnval.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gencolusb/extract_unsafe_backwards.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gencolusb/verify_uset.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gendict/gendict.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/extradata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/extradata.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/gennorm2.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/norms.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/norms.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/derb.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/errmsg.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/errmsg.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/filterrb.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/filterrb.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/genrb.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/genrb.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/parse.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/parse.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/prscmnts.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/prscmnts.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/rbutil.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/rbutil.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/read.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/read.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/reslist.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/reslist.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/rle.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/rle.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/ustr.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/ustr.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtjava.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtxml.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gensprep/gensprep.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gensprep/gensprep.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gensprep/store.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gentest/genres32.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gentest/gentest.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/gentest/gentest.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/icuinfo/icuinfo.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/icuinfo/testplug.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/icupkg/icupkg.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/icuswap/icuswap.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/makeconv/gencnvex.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/makeconv/genmbcs.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/makeconv/genmbcs.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/makeconv/makeconv.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/makeconv/makeconv.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/makeconv/ucnvstat.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp
Parsing failed to find end of parameter list; semicolon terminated it in (cmd, "%s%s%s %s -o %s%s %s %s%s %s %s",
                pkgDataFlags[GENLIB],
                targetDir,
                libFileNames[LIB_FILE_MINGW],
                pkgDataFlags[LDICUDTFLAGS],
    
Parsing failed to find end of parameter list; semicolon terminated it in (cmd, "%s%s%s %s -o %s%s %s %s%s %s %s",
                pkgDataFlags[GENLIB],
                targetDir,
                libFileNames[LIB_FILE_VERSION_TMP],
                pkgDataFlags[LDICUDTFLAGS]
Parsing failed to find end of parameter list; semicolon terminated it in (cmd, "%s %s%s;%s %s -o %s%s %s %s%s %s %s",
                RM_CMD,
                targetDir,
                libFileNames[LIB_FILE_VERSION_TMP],
                pkgDataFlags[GENLIB],
              
Examining data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgtypes.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgtypes.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/collationinfo.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/collationinfo.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/dbgutil.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/dbgutil.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/denseranges.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/denseranges.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/filestrm.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/filestrm.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/filetools.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/filetools.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/flagparser.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/flagparser.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_gencmn.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_gencmn.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_icu.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_icu.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_imp.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkgitems.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ppucd.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ppucd.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/swapimpl.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/swapimpl.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/toolutil.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/toolutil.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucbuf.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucbuf.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucln_tu.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucm.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucm.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucmstate.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/udbgutil.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/udbgutil.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/unewdata.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/unewdata.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/uoptions.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/uoptions.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/uparse.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/uparse.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/xmlparser.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/xmlparser.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/asctime.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/ialloc.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/icuzdump.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/private.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/scheck.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tz2icu.cpp
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tz2icu.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tzfile.h
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c
Examining data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c
Examining data/mozjs78-78.4.0/js/public/experimental/CodeCoverage.h
Examining data/mozjs78-78.4.0/js/public/experimental/SourceHook.h
Examining data/mozjs78-78.4.0/js/public/AllocPolicy.h
Examining data/mozjs78-78.4.0/js/public/AllocationRecording.h
Examining data/mozjs78-78.4.0/js/public/Array.h
Examining data/mozjs78-78.4.0/js/public/ArrayBuffer.h
Examining data/mozjs78-78.4.0/js/public/ArrayBufferMaybeShared.h
Examining data/mozjs78-78.4.0/js/public/BigInt.h
Examining data/mozjs78-78.4.0/js/public/BinASTFormat.h
Examining data/mozjs78-78.4.0/js/public/BuildId.h
Examining data/mozjs78-78.4.0/js/public/CallArgs.h
Examining data/mozjs78-78.4.0/js/public/CallNonGenericMethod.h
Examining data/mozjs78-78.4.0/js/public/CharacterEncoding.h
Examining data/mozjs78-78.4.0/js/public/Class.h
Examining data/mozjs78-78.4.0/js/public/ComparisonOperators.h
Examining data/mozjs78-78.4.0/js/public/CompilationAndEvaluation.h
Examining data/mozjs78-78.4.0/js/public/CompileOptions.h
Examining data/mozjs78-78.4.0/js/public/ContextOptions.h
Examining data/mozjs78-78.4.0/js/public/Conversions.h
Examining data/mozjs78-78.4.0/js/public/Date.h
Examining data/mozjs78-78.4.0/js/public/Debug.h
Examining data/mozjs78-78.4.0/js/public/Equality.h
Examining data/mozjs78-78.4.0/js/public/ErrorReport.h
Examining data/mozjs78-78.4.0/js/public/Exception.h
Examining data/mozjs78-78.4.0/js/public/ForOfIterator.h
Examining data/mozjs78-78.4.0/js/public/GCAPI.h
Examining data/mozjs78-78.4.0/js/public/GCAnnotations.h
Examining data/mozjs78-78.4.0/js/public/GCHashTable.h
Examining data/mozjs78-78.4.0/js/public/GCPolicyAPI.h
Examining data/mozjs78-78.4.0/js/public/GCTypeMacros.h
Examining data/mozjs78-78.4.0/js/public/GCVariant.h
Examining data/mozjs78-78.4.0/js/public/GCVector.h
Examining data/mozjs78-78.4.0/js/public/HashTable.h
Examining data/mozjs78-78.4.0/js/public/HeapAPI.h
Examining data/mozjs78-78.4.0/js/public/Id.h
Examining data/mozjs78-78.4.0/js/public/Initialization.h
Examining data/mozjs78-78.4.0/js/public/JSON.h
Examining data/mozjs78-78.4.0/js/public/LocaleSensitive.h
Examining data/mozjs78-78.4.0/js/public/MemoryFunctions.h
Examining data/mozjs78-78.4.0/js/public/MemoryMetrics.h
Examining data/mozjs78-78.4.0/js/public/Modules.h
Examining data/mozjs78-78.4.0/js/public/OffThreadScriptCompilation.h
Examining data/mozjs78-78.4.0/js/public/Principals.h
Examining data/mozjs78-78.4.0/js/public/Printf.h
Examining data/mozjs78-78.4.0/js/public/ProfilingCategory.h
Examining data/mozjs78-78.4.0/js/public/ProfilingFrameIterator.h
Examining data/mozjs78-78.4.0/js/public/ProfilingStack.h
Examining data/mozjs78-78.4.0/js/public/Promise.h
Examining data/mozjs78-78.4.0/js/public/PropertyDescriptor.h
Examining data/mozjs78-78.4.0/js/public/PropertySpec.h
Examining data/mozjs78-78.4.0/js/public/ProtoKey.h
Examining data/mozjs78-78.4.0/js/public/Proxy.h
Examining data/mozjs78-78.4.0/js/public/Realm.h
Examining data/mozjs78-78.4.0/js/public/RealmOptions.h
Examining data/mozjs78-78.4.0/js/public/RefCounted.h
Examining data/mozjs78-78.4.0/js/public/RegExp.h
Examining data/mozjs78-78.4.0/js/public/RegExpFlags.h
Examining data/mozjs78-78.4.0/js/public/RequiredDefines.h
Examining data/mozjs78-78.4.0/js/public/Result.h
Examining data/mozjs78-78.4.0/js/public/RootingAPI.h
Examining data/mozjs78-78.4.0/js/public/SavedFrameAPI.h
Examining data/mozjs78-78.4.0/js/public/SharedArrayBuffer.h
Examining data/mozjs78-78.4.0/js/public/SliceBudget.h
Examining data/mozjs78-78.4.0/js/public/SourceText.h
Examining data/mozjs78-78.4.0/js/public/StableStringChars.h
Examining data/mozjs78-78.4.0/js/public/Stream.h
Examining data/mozjs78-78.4.0/js/public/StructuredClone.h
Examining data/mozjs78-78.4.0/js/public/SweepingAPI.h
Examining data/mozjs78-78.4.0/js/public/Symbol.h
Examining data/mozjs78-78.4.0/js/public/TraceKind.h
Examining data/mozjs78-78.4.0/js/public/TraceLoggerAPI.h
Examining data/mozjs78-78.4.0/js/public/TracingAPI.h
Examining data/mozjs78-78.4.0/js/public/Transcoding.h
Examining data/mozjs78-78.4.0/js/public/TypeDecls.h
Examining data/mozjs78-78.4.0/js/public/UbiNode.h
Examining data/mozjs78-78.4.0/js/public/UbiNodeBreadthFirst.h
Examining data/mozjs78-78.4.0/js/public/UbiNodeCensus.h
Examining data/mozjs78-78.4.0/js/public/UbiNodeDominatorTree.h
Examining data/mozjs78-78.4.0/js/public/UbiNodePostOrder.h
Examining data/mozjs78-78.4.0/js/public/UbiNodeShortestPaths.h
Examining data/mozjs78-78.4.0/js/public/UbiNodeUtils.h
Examining data/mozjs78-78.4.0/js/public/UniquePtr.h
Examining data/mozjs78-78.4.0/js/public/Utility.h
Examining data/mozjs78-78.4.0/js/public/Value.h
Examining data/mozjs78-78.4.0/js/public/ValueArray.h
Examining data/mozjs78-78.4.0/js/public/Vector.h
Examining data/mozjs78-78.4.0/js/public/Warnings.h
Examining data/mozjs78-78.4.0/js/public/WeakMapPtr.h
Examining data/mozjs78-78.4.0/js/public/Wrapper.h
Examining data/mozjs78-78.4.0/js/rust/etc/wrapper.hpp
Examining data/mozjs78-78.4.0/js/rust/src/jsglue.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/Collator.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/Collator.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/CommonFunctions.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/CommonFunctions.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/DateTimeFormat.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/DateTimeFormat.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/DisplayNames.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/DisplayNames.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/IntlObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/IntlObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTag.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTag.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTagGenerated.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/ListFormat.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/ListFormat.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/Locale.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/Locale.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/MeasureUnitGenerated.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/NumberFormat.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/NumberFormat.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/PluralRules.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/PluralRules.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/RelativeTimeFormat.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/RelativeTimeFormat.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/ScopedICUObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/SharedIntlData.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/intl/SharedIntlData.h
Examining data/mozjs78-78.4.0/js/src/builtin/intl/TimeZoneDataGenerated.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ClassSpecMacro.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/HandlerFunction-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/MiscellaneousOperations-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/MiscellaneousOperations.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/MiscellaneousOperations.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/PipeToState.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/PipeToState.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/PullIntoDescriptor.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/PullIntoDescriptor.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/QueueWithSizes-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/QueueWithSizes.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/QueueWithSizes.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/QueueingStrategies.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/QueueingStrategies.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStream.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStream.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamBYOBReader.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamController.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamDefaultController.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamDefaultControllerOperations.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamDefaultControllerOperations.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamDefaultReader.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamInternals.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamInternals.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamOperations.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamOperations.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamReader-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamReader.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStreamReader.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/StreamAPI.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/StreamController-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/StreamController.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/TeeState.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/TeeState.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStream-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStream.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStream.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamDefaultController.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamDefaultController.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamDefaultControllerOperations.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamDefaultControllerOperations.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamDefaultWriter-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamDefaultWriter.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamDefaultWriter.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamOperations.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamOperations.h
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamWriterOperations.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/streams/WritableStreamWriterOperations.h
Examining data/mozjs78-78.4.0/js/src/builtin/Array-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/Array.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/Array.h
Examining data/mozjs78-78.4.0/js/src/builtin/AtomicsObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/AtomicsObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/BigInt.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/BigInt.h
Examining data/mozjs78-78.4.0/js/src/builtin/Boolean-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/Boolean.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/Boolean.h
Examining data/mozjs78-78.4.0/js/src/builtin/DataViewObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/DataViewObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/Eval.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/Eval.h
Examining data/mozjs78-78.4.0/js/src/builtin/FinalizationRegistryObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/FinalizationRegistryObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/JSON.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/JSON.h
Examining data/mozjs78-78.4.0/js/src/builtin/MapObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/MapObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/ModuleObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/ModuleObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/Object.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/Object.h
Examining data/mozjs78-78.4.0/js/src/builtin/Profilers.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/Profilers.h
Examining data/mozjs78-78.4.0/js/src/builtin/Promise-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/Promise.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/Promise.h
Examining data/mozjs78-78.4.0/js/src/builtin/Reflect.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/Reflect.h
Examining data/mozjs78-78.4.0/js/src/builtin/ReflectParse.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/RegExp.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/RegExp.h
Examining data/mozjs78-78.4.0/js/src/builtin/SelfHostingDefines.h
Examining data/mozjs78-78.4.0/js/src/builtin/Stream.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/Stream.h
Examining data/mozjs78-78.4.0/js/src/builtin/String.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/String.h
Examining data/mozjs78-78.4.0/js/src/builtin/Symbol.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/Symbol.h
Examining data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.h
Examining data/mozjs78-78.4.0/js/src/builtin/TypedObject-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/TypedObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/TypedObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/TypedObjectConstants.h
Examining data/mozjs78-78.4.0/js/src/builtin/WeakMapObject-inl.h
Examining data/mozjs78-78.4.0/js/src/builtin/WeakMapObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/WeakMapObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/WeakRefObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/WeakRefObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/WeakSetObject.cpp
Examining data/mozjs78-78.4.0/js/src/builtin/WeakSetObject.h
Examining data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.cpp
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/include/ffi_common.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/aarch64/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/aarch64/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/alpha/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/alpha/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/arc/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/arc/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/arm/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/arm/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/avr32/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/avr32/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/bfin/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/bfin/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/cris/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/cris/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/frv/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/frv/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/ia64/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/ia64/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/ia64/ia64_flags.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m32r/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m32r/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m68k/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m68k/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m88k/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m88k/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/metag/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/metag/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/microblaze/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/microblaze/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/mips/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/mips/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/moxie/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/moxie/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/nios2/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/nios2/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/pa/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/pa/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/asm.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_darwin.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_linux64.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_powerpc.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_sysv.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/s390/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/s390/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sh/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sh/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sh64/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sh64/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sparc/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sparc/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/tile/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/tile/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/vax/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/vax/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/x86/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/x86/ffi64.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/x86/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/xtensa/ffi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/xtensa/ffitarget.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/closures.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/debug.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/dlmalloc.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/java_raw_api.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/prep_cif.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/raw_api.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/src/types.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/closure_fn0.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/closure_fn1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/closure_fn2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/closure_fn3.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/closure_fn4.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/closure_fn5.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/closure_fn6.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/closure_loc_fn0.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/closure_simple.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_12byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_16byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_18byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_19byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_1_1byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_20byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_20byte1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_24byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_2byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_3_1byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_3byte1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_3byte2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_4_1byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_4byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_5_1_byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_5byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_64byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_6_1_byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_6byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_7_1_byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_7byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_8byte.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_9byte1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_9byte2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_double.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_float.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_longdouble.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_longdouble_split.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_longdouble_split2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_pointer.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_sint16.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_sint32.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_sint64.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_uint16.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_uint32.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_align_uint64.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_dbls_struct.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_double.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_double_va.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_float.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_longdouble.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_longdouble_va.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_many_mixed_args.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_many_mixed_float_double.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_schar.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_sshort.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_sshortchar.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_uchar.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_ushort.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_ushortchar.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_pointer.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_pointer_stack.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_schar.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_sint.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_sshort.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_struct_va1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_uchar.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_uchar_va.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_uint.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_uint_va.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_ulong_va.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_ulonglong.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_ushort.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_ushort_va.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/err_bad_abi.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/err_bad_typedef.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/ffitest.h
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/float.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/float1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/float2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/float3.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/float4.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/float_va.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/huge_struct.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/many.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/many2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/many_double.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/many_mixed.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/negint.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct10.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct11.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct3.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct4.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct5.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct6.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct7.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct8.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/nested_struct9.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/problem1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/promotion.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/pyobjc-tc.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_dbl.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_dbl1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_dbl2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_fl.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_fl1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_fl2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_fl3.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_ldl.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_ll.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_ll1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_sc.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_sl.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_uc.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/return_ul.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/stret_large.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/stret_large2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/stret_medium.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/stret_medium2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/strlen.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/strlen2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/strlen3.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/strlen4.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/struct1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/struct2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/struct3.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/struct4.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/struct5.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/struct6.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/struct7.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/struct8.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/struct9.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/testclosure.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/uninitialized.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/unwindtest.cc
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/unwindtest_ffi_call.cc
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/va_1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/va_struct1.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/va_struct2.c
Examining data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/va_struct3.c
Examining data/mozjs78-78.4.0/js/src/ctypes/CTypes.cpp
Examining data/mozjs78-78.4.0/js/src/ctypes/CTypes.h
Examining data/mozjs78-78.4.0/js/src/ctypes/Library.cpp
Examining data/mozjs78-78.4.0/js/src/ctypes/Library.h
Examining data/mozjs78-78.4.0/js/src/ctypes/typedefs.h
Examining data/mozjs78-78.4.0/js/src/debugger/DebugAPI-inl.h
Examining data/mozjs78-78.4.0/js/src/debugger/DebugAPI.h
Examining data/mozjs78-78.4.0/js/src/debugger/DebugScript.cpp
Examining data/mozjs78-78.4.0/js/src/debugger/DebugScript.h
Examining data/mozjs78-78.4.0/js/src/debugger/Debugger-inl.h
Examining data/mozjs78-78.4.0/js/src/debugger/Debugger.cpp
Examining data/mozjs78-78.4.0/js/src/debugger/Debugger.h
Examining data/mozjs78-78.4.0/js/src/debugger/DebuggerMemory.cpp
Examining data/mozjs78-78.4.0/js/src/debugger/DebuggerMemory.h
Examining data/mozjs78-78.4.0/js/src/debugger/Environment-inl.h
Examining data/mozjs78-78.4.0/js/src/debugger/Environment.cpp
Examining data/mozjs78-78.4.0/js/src/debugger/Environment.h
Examining data/mozjs78-78.4.0/js/src/debugger/Frame-inl.h
Examining data/mozjs78-78.4.0/js/src/debugger/Frame.cpp
Examining data/mozjs78-78.4.0/js/src/debugger/Frame.h
Examining data/mozjs78-78.4.0/js/src/debugger/NoExecute.cpp
Examining data/mozjs78-78.4.0/js/src/debugger/NoExecute.h
Examining data/mozjs78-78.4.0/js/src/debugger/Object-inl.h
Examining data/mozjs78-78.4.0/js/src/debugger/Object.cpp
Examining data/mozjs78-78.4.0/js/src/debugger/Object.h
Examining data/mozjs78-78.4.0/js/src/debugger/Script-inl.h
Examining data/mozjs78-78.4.0/js/src/debugger/Script.cpp
Examining data/mozjs78-78.4.0/js/src/debugger/Script.h
Examining data/mozjs78-78.4.0/js/src/debugger/Source.cpp
Examining data/mozjs78-78.4.0/js/src/debugger/Source.h
Examining data/mozjs78-78.4.0/js/src/devtools/rootAnalysis/t/exceptions/source.cpp
Examining data/mozjs78-78.4.0/js/src/devtools/rootAnalysis/t/hazards/source.cpp
Examining data/mozjs78-78.4.0/js/src/devtools/rootAnalysis/t/sixgill-tree/source.cpp
Examining data/mozjs78-78.4.0/js/src/devtools/rootAnalysis/t/suppression/source.cpp
Examining data/mozjs78-78.4.0/js/src/devtools/rootAnalysis/t/virtual/source.cpp
Examining data/mozjs78-78.4.0/js/src/devtools/vprof/testVprofMT.c
Examining data/mozjs78-78.4.0/js/src/devtools/vprof/vprof.cpp
Examining data/mozjs78-78.4.0/js/src/devtools/vprof/vprof.h
Examining data/mozjs78-78.4.0/js/src/devtools/Instruments.cpp
Examining data/mozjs78-78.4.0/js/src/devtools/Instruments.h
Examining data/mozjs78-78.4.0/js/src/ds/BitArray.h
Examining data/mozjs78-78.4.0/js/src/ds/Bitmap.cpp
Examining data/mozjs78-78.4.0/js/src/ds/Bitmap.h
Examining data/mozjs78-78.4.0/js/src/ds/Fifo.h
Examining data/mozjs78-78.4.0/js/src/ds/FixedLengthVector.h
Examining data/mozjs78-78.4.0/js/src/ds/IdValuePair.h
Examining data/mozjs78-78.4.0/js/src/ds/InlineTable.h
Examining data/mozjs78-78.4.0/js/src/ds/LifoAlloc.cpp
Examining data/mozjs78-78.4.0/js/src/ds/LifoAlloc.h
Examining data/mozjs78-78.4.0/js/src/ds/MemoryProtectionExceptionHandler.cpp
Examining data/mozjs78-78.4.0/js/src/ds/MemoryProtectionExceptionHandler.h
Examining data/mozjs78-78.4.0/js/src/ds/Nestable.h
Examining data/mozjs78-78.4.0/js/src/ds/OrderedHashTable.h
Examining data/mozjs78-78.4.0/js/src/ds/PageProtectingVector.h
Examining data/mozjs78-78.4.0/js/src/ds/PriorityQueue.h
Examining data/mozjs78-78.4.0/js/src/ds/Sort.h
Examining data/mozjs78-78.4.0/js/src/ds/SplayTree.h
Examining data/mozjs78-78.4.0/js/src/ds/TraceableFifo.h
Examining data/mozjs78-78.4.0/js/src/editline/editline.c
Examining data/mozjs78-78.4.0/js/src/editline/editline.h
Examining data/mozjs78-78.4.0/js/src/editline/sysunix.c
Examining data/mozjs78-78.4.0/js/src/editline/unix.h
Examining data/mozjs78-78.4.0/js/src/frontend/AbstractScopePtr.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/AbstractScopePtr.h
Examining data/mozjs78-78.4.0/js/src/frontend/BCEParserHandle.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinAST-macros.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTEnum.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTParser.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTParser.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTParserBase.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTParserBase.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTParserPerTokenizer.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTParserPerTokenizer.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTRuntimeSupport.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTRuntimeSupport.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTToken.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTToken.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTTokenReaderBase.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTTokenReaderBase.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTTokenReaderContext.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTTokenReaderContext.h
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTTokenReaderMultipart.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BinASTTokenReaderMultipart.h
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeCompilation.h
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeCompiler.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeCompiler.h
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeControlStructures.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeControlStructures.h
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeOffset.h
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeSection.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/BytecodeSection.h
Examining data/mozjs78-78.4.0/js/src/frontend/CForEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/CForEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/CallOrNewEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/CallOrNewEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/CompilationInfo.h
Examining data/mozjs78-78.4.0/js/src/frontend/DefaultEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/DefaultEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/DestructuringFlavor.h
Examining data/mozjs78-78.4.0/js/src/frontend/DoWhileEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/DoWhileEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/EitherParser.h
Examining data/mozjs78-78.4.0/js/src/frontend/ElemOpEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ElemOpEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/EmitterScope.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/EmitterScope.h
Examining data/mozjs78-78.4.0/js/src/frontend/ErrorReporter.h
Examining data/mozjs78-78.4.0/js/src/frontend/ExpressionStatementEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ExpressionStatementEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/FoldConstants.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/FoldConstants.h
Examining data/mozjs78-78.4.0/js/src/frontend/ForInEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ForInEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/ForOfEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ForOfEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/ForOfLoopControl.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ForOfLoopControl.h
Examining data/mozjs78-78.4.0/js/src/frontend/Frontend2.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/Frontend2.h
Examining data/mozjs78-78.4.0/js/src/frontend/FullParseHandler.h
Examining data/mozjs78-78.4.0/js/src/frontend/FunctionEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/FunctionEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/FunctionSyntaxKind.h
Examining data/mozjs78-78.4.0/js/src/frontend/IfEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/IfEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/JumpList.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/JumpList.h
Examining data/mozjs78-78.4.0/js/src/frontend/LabelEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/LabelEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/LexicalScopeEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/LexicalScopeEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/ModuleSharedContext.h
Examining data/mozjs78-78.4.0/js/src/frontend/NameAnalysisTypes.h
Examining data/mozjs78-78.4.0/js/src/frontend/NameCollections.h
Examining data/mozjs78-78.4.0/js/src/frontend/NameFunctions.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/NameFunctions.h
Examining data/mozjs78-78.4.0/js/src/frontend/NameOpEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/NameOpEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/ObjLiteral.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ObjLiteral.h
Examining data/mozjs78-78.4.0/js/src/frontend/ObjectEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ObjectEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/OptionalEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/OptionalEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/ParseContext-inl.h
Examining data/mozjs78-78.4.0/js/src/frontend/ParseContext.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ParseContext.h
Examining data/mozjs78-78.4.0/js/src/frontend/ParseNode.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ParseNode.h
Examining data/mozjs78-78.4.0/js/src/frontend/ParseNodeVerify.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/ParseNodeVerify.h
Examining data/mozjs78-78.4.0/js/src/frontend/ParseNodeVisitor.h
Examining data/mozjs78-78.4.0/js/src/frontend/Parser.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/Parser.h
Examining data/mozjs78-78.4.0/js/src/frontend/PropOpEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/PropOpEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/ReservedWords.h
Examining data/mozjs78-78.4.0/js/src/frontend/SharedContext-inl.h
Examining data/mozjs78-78.4.0/js/src/frontend/SharedContext.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/SharedContext.h
Examining data/mozjs78-78.4.0/js/src/frontend/SourceNotes.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/SourceNotes.h
Examining data/mozjs78-78.4.0/js/src/frontend/Stencil.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/Stencil.h
Examining data/mozjs78-78.4.0/js/src/frontend/SwitchEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/SwitchEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/SyntaxParseHandler.h
Examining data/mozjs78-78.4.0/js/src/frontend/TDZCheckCache.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/TDZCheckCache.h
Examining data/mozjs78-78.4.0/js/src/frontend/Token.h
Examining data/mozjs78-78.4.0/js/src/frontend/TokenKind.h
Examining data/mozjs78-78.4.0/js/src/frontend/TokenStream.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/TokenStream.h
Examining data/mozjs78-78.4.0/js/src/frontend/TryEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/TryEmitter.h
Examining data/mozjs78-78.4.0/js/src/frontend/TypedIndex.h
Examining data/mozjs78-78.4.0/js/src/frontend/UsedNameTracker.h
Examining data/mozjs78-78.4.0/js/src/frontend/ValueUsage.h
Examining data/mozjs78-78.4.0/js/src/frontend/WhileEmitter.cpp
Examining data/mozjs78-78.4.0/js/src/frontend/WhileEmitter.h
Examining data/mozjs78-78.4.0/js/src/fuzz-tests/testBinASTReader.cpp
Examining data/mozjs78-78.4.0/js/src/fuzz-tests/testExample.cpp
Examining data/mozjs78-78.4.0/js/src/fuzz-tests/testRegExp.cpp
Examining data/mozjs78-78.4.0/js/src/fuzz-tests/testStructuredCloneReader.cpp
Examining data/mozjs78-78.4.0/js/src/fuzz-tests/testWasm.cpp
Examining data/mozjs78-78.4.0/js/src/fuzz-tests/tests.cpp
Examining data/mozjs78-78.4.0/js/src/fuzz-tests/tests.h
Examining data/mozjs78-78.4.0/js/src/gc/AllocKind.h
Examining data/mozjs78-78.4.0/js/src/gc/Allocator.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Allocator.h
Examining data/mozjs78-78.4.0/js/src/gc/ArenaList-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/ArenaList.h
Examining data/mozjs78-78.4.0/js/src/gc/AtomMarking-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/AtomMarking.cpp
Examining data/mozjs78-78.4.0/js/src/gc/AtomMarking.h
Examining data/mozjs78-78.4.0/js/src/gc/Barrier.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Barrier.h
Examining data/mozjs78-78.4.0/js/src/gc/Cell.h
Examining data/mozjs78-78.4.0/js/src/gc/ClearEdgesTracer.h
Examining data/mozjs78-78.4.0/js/src/gc/DeletePolicy.h
Examining data/mozjs78-78.4.0/js/src/gc/FinalizationRegistry.cpp
Examining data/mozjs78-78.4.0/js/src/gc/FindSCCs.h
Examining data/mozjs78-78.4.0/js/src/gc/FreeOp-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/FreeOp.h
Examining data/mozjs78-78.4.0/js/src/gc/GC-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/GC.cpp
Examining data/mozjs78-78.4.0/js/src/gc/GC.h
Examining data/mozjs78-78.4.0/js/src/gc/GCEnum.h
Examining data/mozjs78-78.4.0/js/src/gc/GCInternals.h
Examining data/mozjs78-78.4.0/js/src/gc/GCLock.h
Examining data/mozjs78-78.4.0/js/src/gc/GCMarker.h
Examining data/mozjs78-78.4.0/js/src/gc/GCParallelTask.cpp
Examining data/mozjs78-78.4.0/js/src/gc/GCParallelTask.h
Examining data/mozjs78-78.4.0/js/src/gc/GCProbes.h
Examining data/mozjs78-78.4.0/js/src/gc/GCRuntime.h
Examining data/mozjs78-78.4.0/js/src/gc/HashUtil.h
Examining data/mozjs78-78.4.0/js/src/gc/Heap-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/Heap.h
Examining data/mozjs78-78.4.0/js/src/gc/Marking-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/Marking.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Marking.h
Examining data/mozjs78-78.4.0/js/src/gc/MaybeRooted.h
Examining data/mozjs78-78.4.0/js/src/gc/Memory.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Memory.h
Examining data/mozjs78-78.4.0/js/src/gc/Nursery-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/Nursery.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Nursery.h
Examining data/mozjs78-78.4.0/js/src/gc/NurseryAwareHashMap.h
Examining data/mozjs78-78.4.0/js/src/gc/ObjectKind-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/ParallelWork.h
Examining data/mozjs78-78.4.0/js/src/gc/Policy.h
Examining data/mozjs78-78.4.0/js/src/gc/PrivateIterators-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/PublicIterators.cpp
Examining data/mozjs78-78.4.0/js/src/gc/PublicIterators.h
Examining data/mozjs78-78.4.0/js/src/gc/RelocationOverlay.h
Examining data/mozjs78-78.4.0/js/src/gc/RootMarking.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Rooting.h
Examining data/mozjs78-78.4.0/js/src/gc/Scheduling.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Scheduling.h
Examining data/mozjs78-78.4.0/js/src/gc/Statistics.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Statistics.h
Examining data/mozjs78-78.4.0/js/src/gc/StoreBuffer-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/StoreBuffer.cpp
Examining data/mozjs78-78.4.0/js/src/gc/StoreBuffer.h
Examining data/mozjs78-78.4.0/js/src/gc/Tracer.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Tracer.h
Examining data/mozjs78-78.4.0/js/src/gc/Verifier.cpp
Examining data/mozjs78-78.4.0/js/src/gc/WeakMap-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/WeakMap.cpp
Examining data/mozjs78-78.4.0/js/src/gc/WeakMap.h
Examining data/mozjs78-78.4.0/js/src/gc/WeakMapPtr.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Zone-inl.h
Examining data/mozjs78-78.4.0/js/src/gc/Zone.cpp
Examining data/mozjs78-78.4.0/js/src/gc/Zone.h
Examining data/mozjs78-78.4.0/js/src/gc/ZoneAllocator.h
Examining data/mozjs78-78.4.0/js/src/gdb/tests/enum-printers.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-ExecutableAllocator.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-GCCellPtr.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-Interpreter.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-JSObject.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-JSString.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-JSSymbol.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-Root.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-asmjs.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-jsbytecode.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-jsid.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-jsop.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-jsval.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-prettyprinters.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/test-unwind.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/tests/typedef-printers.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/gdb-tests.cpp
Examining data/mozjs78-78.4.0/js/src/gdb/gdb-tests.h
Examining data/mozjs78-78.4.0/js/src/irregexp/NativeRegExpMacroAssembler.cpp
Examining data/mozjs78-78.4.0/js/src/irregexp/NativeRegExpMacroAssembler.h
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpAST.cpp
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpAST.h
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpBytecode.h
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpCharacters-inl.h
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpCharacters.cpp
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpCharacters.h
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpEngine.cpp
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpEngine.h
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpInterpreter.cpp
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpMacroAssembler.cpp
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpMacroAssembler.h
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpParser.cpp
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpParser.h
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpStack.cpp
Examining data/mozjs78-78.4.0/js/src/irregexp/RegExpStack.h
Examining data/mozjs78-78.4.0/js/src/NamespaceImports.h
Examining data/mozjs78-78.4.0/js/src/dtoa.c
Examining data/mozjs78-78.4.0/js/src/jsapi.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi.h
Examining data/mozjs78-78.4.0/js/src/jsdate.cpp
Examining data/mozjs78-78.4.0/js/src/jsdate.h
Examining data/mozjs78-78.4.0/js/src/jsexn.cpp
Examining data/mozjs78-78.4.0/js/src/jsexn.h
Examining data/mozjs78-78.4.0/js/src/jsfriendapi.cpp
Examining data/mozjs78-78.4.0/js/src/jsfriendapi.h
Examining data/mozjs78-78.4.0/js/src/jslibmath.h
Examining data/mozjs78-78.4.0/js/src/jsmath.cpp
Examining data/mozjs78-78.4.0/js/src/jsmath.h
Examining data/mozjs78-78.4.0/js/src/jsnum.cpp
Examining data/mozjs78-78.4.0/js/src/jsnum.h
Examining data/mozjs78-78.4.0/js/src/jspubtd.h
Examining data/mozjs78-78.4.0/js/src/jstypes.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/disasm/Constants-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/disasm/Constants-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/disasm/Disasm-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/disasm/Disasm-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/llvm-compiler-rt/assembly.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/Architecture-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/Architecture-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/Bailouts-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/LIR-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/MoveEmitter-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/MoveEmitter-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/SharedICHelpers-arm-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/SharedICHelpers-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/SharedICRegisters-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.h
Examining data/mozjs78-78.4.0/js/src/jit/arm/Trampoline-arm.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Assembler-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Assembler-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/CompilerIntrinsics-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Constants-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Cpu-Features-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Cpu-Features-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Cpu-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Cpu-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Debugger-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Debugger-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Decoder-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Decoder-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Globals-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instructions-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instructions-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instrument-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instrument-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Logic-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MacroAssembler-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MacroAssembler-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozAssembler-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozBaseAssembler-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozCachingDecoder.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozCpu-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozInstructions-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozSimulator-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Platform-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-Constants-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Utils-vixl.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Utils-vixl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/Architecture-arm64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/Architecture-arm64.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/Assembler-arm64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/Assembler-arm64.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/Bailouts-arm64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/CodeGenerator-arm64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/CodeGenerator-arm64.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/LIR-arm64.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/Lowering-arm64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/Lowering-arm64.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/MoveEmitter-arm64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/arm64/MoveEmitter-arm64.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/SharedICHelpers-arm64-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/SharedICHelpers-arm64.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/SharedICRegisters-arm64.h
Examining data/mozjs78-78.4.0/js/src/jit/arm64/Trampoline-arm64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/Architecture-mips-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/Architecture-mips-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/AtomicOperations-mips-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/Bailouts-mips-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/BaselineIC-mips-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/LIR-mips-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/MoveEmitter-mips-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/MoveEmitter-mips-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/SharedICHelpers-mips-shared-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/mips-shared/SharedICHelpers-mips-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Architecture-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Architecture-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Assembler-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Assembler-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Bailouts-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Bailouts-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/LIR-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Lowering-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Lowering-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/MoveEmitter-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips32/MoveEmitter-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/SharedICRegisters-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.h
Examining data/mozjs78-78.4.0/js/src/jit/mips32/Trampoline-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Architecture-mips64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Architecture-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Assembler-mips64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Assembler-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Bailouts-mips64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Bailouts-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/CodeGenerator-mips64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips64/CodeGenerator-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/LIR-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Lowering-mips64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Lowering-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/MoveEmitter-mips64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips64/MoveEmitter-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/SharedICRegisters-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.h
Examining data/mozjs78-78.4.0/js/src/jit/mips64/Trampoline-mips64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/none/Architecture-none.h
Examining data/mozjs78-78.4.0/js/src/jit/none/CodeGenerator-none.h
Examining data/mozjs78-78.4.0/js/src/jit/none/LIR-none.h
Examining data/mozjs78-78.4.0/js/src/jit/none/Lowering-none.h
Examining data/mozjs78-78.4.0/js/src/jit/none/MacroAssembler-none.h
Examining data/mozjs78-78.4.0/js/src/jit/none/MoveEmitter-none.h
Examining data/mozjs78-78.4.0/js/src/jit/none/SharedICHelpers-none-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/none/SharedICHelpers-none.h
Examining data/mozjs78-78.4.0/js/src/jit/none/SharedICRegisters-none.h
Examining data/mozjs78-78.4.0/js/src/jit/none/Trampoline-none.cpp
Examining data/mozjs78-78.4.0/js/src/jit/shared/Architecture-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/Assembler-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/AtomicOperations-feeling-lucky-msvc.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/AtomicOperations-feeling-lucky.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/AtomicOperations-shared-jit.cpp
Examining data/mozjs78-78.4.0/js/src/jit/shared/AtomicOperations-shared-jit.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/CodeGenerator-shared-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/CodeGenerator-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/shared/CodeGenerator-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/Disassembler-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/shared/Disassembler-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/IonAssemblerBuffer.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/IonAssemblerBufferWithConstantPools.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/LIR-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/Lowering-shared-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/Lowering-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/shared/Lowering-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/shared/AtomicOperations-feeling-lucky-gcc.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/Assembler-x64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x64/Assembler-x64.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/Bailouts-x64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x64/BaseAssembler-x64.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/LIR-x64.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/Lowering-x64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x64/Lowering-x64.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/SharedICHelpers-x64-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/SharedICHelpers-x64.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/SharedICRegisters-x64.h
Examining data/mozjs78-78.4.0/js/src/jit/x64/Trampoline-x64.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/Architecture-x86-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/Architecture-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/Assembler-x86-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/Assembler-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/AssemblerBuffer-x86-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/AssemblerBuffer-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/BaseAssembler-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/CodeGenerator-x86-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/CodeGenerator-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/Constants-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/Encoding-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/LIR-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/Lowering-x86-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/Lowering-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared-SIMD.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/MoveEmitter-x86-shared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/MoveEmitter-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86-shared/Patching-x86-shared.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/Assembler-x86.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86/Assembler-x86.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/Bailouts-x86.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86/BaseAssembler-x86.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/LIR-x86.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp
Examining data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/SharedICHelpers-x86-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/SharedICHelpers-x86.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/SharedICRegisters-x86.h
Examining data/mozjs78-78.4.0/js/src/jit/x86/Trampoline-x86.cpp
Examining data/mozjs78-78.4.0/js/src/jit/AliasAnalysis.cpp
Examining data/mozjs78-78.4.0/js/src/jit/AliasAnalysis.h
Examining data/mozjs78-78.4.0/js/src/jit/AlignmentMaskAnalysis.cpp
Examining data/mozjs78-78.4.0/js/src/jit/AlignmentMaskAnalysis.h
Examining data/mozjs78-78.4.0/js/src/jit/AtomicOp.h
Examining data/mozjs78-78.4.0/js/src/jit/BacktrackingAllocator.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BacktrackingAllocator.h
Examining data/mozjs78-78.4.0/js/src/jit/Bailouts.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Bailouts.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineBailouts.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BaselineCacheIRCompiler.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BaselineCacheIRCompiler.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineCodeGen.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BaselineCodeGen.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineDebugModeOSR.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BaselineDebugModeOSR.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineFrame-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineFrame.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BaselineFrame.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineFrameInfo-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineFrameInfo.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BaselineFrameInfo.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineIC.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BaselineIC.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineICList.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineInspector.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BaselineInspector.h
Examining data/mozjs78-78.4.0/js/src/jit/BaselineJIT.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BaselineJIT.h
Examining data/mozjs78-78.4.0/js/src/jit/BitSet.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BitSet.h
Examining data/mozjs78-78.4.0/js/src/jit/BytecodeAnalysis.cpp
Examining data/mozjs78-78.4.0/js/src/jit/BytecodeAnalysis.h
Examining data/mozjs78-78.4.0/js/src/jit/CacheIR.cpp
Examining data/mozjs78-78.4.0/js/src/jit/CacheIR.h
Examining data/mozjs78-78.4.0/js/src/jit/CacheIRCompiler.cpp
Examining data/mozjs78-78.4.0/js/src/jit/CacheIRCompiler.h
Examining data/mozjs78-78.4.0/js/src/jit/CacheIRSpewer.cpp
Examining data/mozjs78-78.4.0/js/src/jit/CacheIRSpewer.h
Examining data/mozjs78-78.4.0/js/src/jit/CodeGenerator.cpp
Examining data/mozjs78-78.4.0/js/src/jit/CodeGenerator.h
Examining data/mozjs78-78.4.0/js/src/jit/CompactBuffer.h
Examining data/mozjs78-78.4.0/js/src/jit/CompileInfo-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/CompileInfo.h
Examining data/mozjs78-78.4.0/js/src/jit/CompileWrappers.cpp
Examining data/mozjs78-78.4.0/js/src/jit/CompileWrappers.h
Examining data/mozjs78-78.4.0/js/src/jit/Disassemble.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Disassemble.h
Examining data/mozjs78-78.4.0/js/src/jit/EdgeCaseAnalysis.cpp
Examining data/mozjs78-78.4.0/js/src/jit/EdgeCaseAnalysis.h
Examining data/mozjs78-78.4.0/js/src/jit/EffectiveAddressAnalysis.cpp
Examining data/mozjs78-78.4.0/js/src/jit/EffectiveAddressAnalysis.h
Examining data/mozjs78-78.4.0/js/src/jit/ExecutableAllocator.cpp
Examining data/mozjs78-78.4.0/js/src/jit/ExecutableAllocator.h
Examining data/mozjs78-78.4.0/js/src/jit/FixedList.h
Examining data/mozjs78-78.4.0/js/src/jit/FlushICache.h
Examining data/mozjs78-78.4.0/js/src/jit/FoldLinearArithConstants.cpp
Examining data/mozjs78-78.4.0/js/src/jit/FoldLinearArithConstants.h
Examining data/mozjs78-78.4.0/js/src/jit/ICState.h
Examining data/mozjs78-78.4.0/js/src/jit/ICStubSpace.h
Examining data/mozjs78-78.4.0/js/src/jit/InlinableNatives.h
Examining data/mozjs78-78.4.0/js/src/jit/InlineList.h
Examining data/mozjs78-78.4.0/js/src/jit/InstructionReordering.cpp
Examining data/mozjs78-78.4.0/js/src/jit/InstructionReordering.h
Examining data/mozjs78-78.4.0/js/src/jit/Ion.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Ion.h
Examining data/mozjs78-78.4.0/js/src/jit/IonAnalysis.cpp
Examining data/mozjs78-78.4.0/js/src/jit/IonAnalysis.h
Examining data/mozjs78-78.4.0/js/src/jit/IonBuilder.cpp
Examining data/mozjs78-78.4.0/js/src/jit/IonBuilder.h
Examining data/mozjs78-78.4.0/js/src/jit/IonCacheIRCompiler.cpp
Examining data/mozjs78-78.4.0/js/src/jit/IonCacheIRCompiler.h
Examining data/mozjs78-78.4.0/js/src/jit/IonCompileTask.cpp
Examining data/mozjs78-78.4.0/js/src/jit/IonCompileTask.h
Examining data/mozjs78-78.4.0/js/src/jit/IonIC.cpp
Examining data/mozjs78-78.4.0/js/src/jit/IonIC.h
Examining data/mozjs78-78.4.0/js/src/jit/IonInstrumentation.h
Examining data/mozjs78-78.4.0/js/src/jit/IonOptimizationLevels.cpp
Examining data/mozjs78-78.4.0/js/src/jit/IonOptimizationLevels.h
Examining data/mozjs78-78.4.0/js/src/jit/IonScript.h
Examining data/mozjs78-78.4.0/js/src/jit/IonTypes.h
Examining data/mozjs78-78.4.0/js/src/jit/JSJitFrameIter-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/JSJitFrameIter.cpp
Examining data/mozjs78-78.4.0/js/src/jit/JSJitFrameIter.h
Examining data/mozjs78-78.4.0/js/src/jit/JSONSpewer.cpp
Examining data/mozjs78-78.4.0/js/src/jit/JSONSpewer.h
Examining data/mozjs78-78.4.0/js/src/jit/Jit.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Jit.h
Examining data/mozjs78-78.4.0/js/src/jit/JitAllocPolicy.h
Examining data/mozjs78-78.4.0/js/src/jit/JitCode.h
Examining data/mozjs78-78.4.0/js/src/jit/JitCommon.h
Examining data/mozjs78-78.4.0/js/src/jit/JitContext.cpp
Examining data/mozjs78-78.4.0/js/src/jit/JitContext.h
Examining data/mozjs78-78.4.0/js/src/jit/JitFrames-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/JitFrames.cpp
Examining data/mozjs78-78.4.0/js/src/jit/JitFrames.h
Examining data/mozjs78-78.4.0/js/src/jit/JitOptions.cpp
Examining data/mozjs78-78.4.0/js/src/jit/JitOptions.h
Examining data/mozjs78-78.4.0/js/src/jit/JitRealm.h
Examining data/mozjs78-78.4.0/js/src/jit/JitScript-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/JitScript.cpp
Examining data/mozjs78-78.4.0/js/src/jit/JitScript.h
Examining data/mozjs78-78.4.0/js/src/jit/JitSpewer.cpp
Examining data/mozjs78-78.4.0/js/src/jit/JitSpewer.h
Examining data/mozjs78-78.4.0/js/src/jit/JitcodeMap.cpp
Examining data/mozjs78-78.4.0/js/src/jit/JitcodeMap.h
Examining data/mozjs78-78.4.0/js/src/jit/LICM.cpp
Examining data/mozjs78-78.4.0/js/src/jit/LICM.h
Examining data/mozjs78-78.4.0/js/src/jit/LIR.cpp
Examining data/mozjs78-78.4.0/js/src/jit/LIR.h
Examining data/mozjs78-78.4.0/js/src/jit/Label.h
Examining data/mozjs78-78.4.0/js/src/jit/Linker.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Linker.h
Examining data/mozjs78-78.4.0/js/src/jit/Lowering.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Lowering.h
Examining data/mozjs78-78.4.0/js/src/jit/MCallOptimize.cpp
Examining data/mozjs78-78.4.0/js/src/jit/MIR.cpp
Examining data/mozjs78-78.4.0/js/src/jit/MIR.h
Examining data/mozjs78-78.4.0/js/src/jit/MIRBuilderShared.h
Examining data/mozjs78-78.4.0/js/src/jit/MIRGenerator.h
Examining data/mozjs78-78.4.0/js/src/jit/MIRGraph.cpp
Examining data/mozjs78-78.4.0/js/src/jit/MIRGraph.h
Examining data/mozjs78-78.4.0/js/src/jit/MacroAssembler-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/MacroAssembler.cpp
Examining data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h
Examining data/mozjs78-78.4.0/js/src/jit/MoveEmitter.h
Examining data/mozjs78-78.4.0/js/src/jit/MoveResolver.cpp
Examining data/mozjs78-78.4.0/js/src/jit/MoveResolver.h
Examining data/mozjs78-78.4.0/js/src/jit/PcScriptCache.h
Examining data/mozjs78-78.4.0/js/src/jit/PerfSpewer.cpp
Examining data/mozjs78-78.4.0/js/src/jit/PerfSpewer.h
Examining data/mozjs78-78.4.0/js/src/jit/ProcessExecutableMemory.h
Examining data/mozjs78-78.4.0/js/src/jit/RangeAnalysis.cpp
Examining data/mozjs78-78.4.0/js/src/jit/RangeAnalysis.h
Examining data/mozjs78-78.4.0/js/src/jit/Recover.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Recover.h
Examining data/mozjs78-78.4.0/js/src/jit/RegisterAllocator.cpp
Examining data/mozjs78-78.4.0/js/src/jit/RegisterAllocator.h
Examining data/mozjs78-78.4.0/js/src/jit/RegisterSets.h
Examining data/mozjs78-78.4.0/js/src/jit/Registers.h
Examining data/mozjs78-78.4.0/js/src/jit/RematerializedFrame-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/RematerializedFrame.cpp
Examining data/mozjs78-78.4.0/js/src/jit/RematerializedFrame.h
Examining data/mozjs78-78.4.0/js/src/jit/Safepoints.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Safepoints.h
Examining data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp
Examining data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.h
Examining data/mozjs78-78.4.0/js/src/jit/SharedICHelpers-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/SharedICHelpers.h
Examining data/mozjs78-78.4.0/js/src/jit/SharedICRegisters.h
Examining data/mozjs78-78.4.0/js/src/jit/Simulator.h
Examining data/mozjs78-78.4.0/js/src/jit/Sink.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Sink.h
Examining data/mozjs78-78.4.0/js/src/jit/Snapshots.cpp
Examining data/mozjs78-78.4.0/js/src/jit/Snapshots.h
Examining data/mozjs78-78.4.0/js/src/jit/StackSlotAllocator.h
Examining data/mozjs78-78.4.0/js/src/jit/TIOracle.cpp
Examining data/mozjs78-78.4.0/js/src/jit/TIOracle.h
Examining data/mozjs78-78.4.0/js/src/jit/TemplateObject-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/TemplateObject.h
Examining data/mozjs78-78.4.0/js/src/jit/TypePolicy.cpp
Examining data/mozjs78-78.4.0/js/src/jit/TypePolicy.h
Examining data/mozjs78-78.4.0/js/src/jit/VMFunctionList-inl.h
Examining data/mozjs78-78.4.0/js/src/jit/VMFunctions.cpp
Examining data/mozjs78-78.4.0/js/src/jit/VMFunctions.h
Examining data/mozjs78-78.4.0/js/src/jit/ValueNumbering.cpp
Examining data/mozjs78-78.4.0/js/src/jit/ValueNumbering.h
Examining data/mozjs78-78.4.0/js/src/jit/WarpBuilder.cpp
Examining data/mozjs78-78.4.0/js/src/jit/WarpBuilder.h
Examining data/mozjs78-78.4.0/js/src/jit/WarpBuilderShared.cpp
Examining data/mozjs78-78.4.0/js/src/jit/WarpBuilderShared.h
Examining data/mozjs78-78.4.0/js/src/jit/WarpCacheIRTranspiler.cpp
Examining data/mozjs78-78.4.0/js/src/jit/WarpCacheIRTranspiler.h
Examining data/mozjs78-78.4.0/js/src/jit/WarpOracle.cpp
Examining data/mozjs78-78.4.0/js/src/jit/WarpOracle.h
Examining data/mozjs78-78.4.0/js/src/jit/WarpSnapshot.cpp
Examining data/mozjs78-78.4.0/js/src/jit/WarpSnapshot.h
Examining data/mozjs78-78.4.0/js/src/jit/WasmBCE.cpp
Examining data/mozjs78-78.4.0/js/src/jit/WasmBCE.h
Examining data/mozjs78-78.4.0/js/src/jit/ProcessExecutableMemory.cpp
Examining data/mozjs78-78.4.0/js/src/jit/AtomicOperations.h
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/hidePointer.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/selfTest.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testAddPropertyPropcache.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testArgumentsObject.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testArrayBuffer.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testArrayBufferView.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testArrayBufferWithUserOwnedContents.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testAssemblerBuffer.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testAtomicOperations.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testAtomizeUtf8NonAsciiLatin1CodePoint.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testBigInt.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testBinASTReader.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testBoundFunction.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testBug604087.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testCallArgs.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testCallNonGenericMethodOnProxy.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testChromeBuffer.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testCompileNonSyntactic.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testCompileUtf8.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testDateToLocaleString.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testDebugger.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testDeepFreeze.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testDefineGetterSetterNonEnumerable.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testDefineProperty.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testDefinePropertyIgnoredAttributes.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testDeflateStringToUTF8Buffer.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testDifferentNewTargetInvokeConstructor.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testEmptyWindowIsOmitted.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testErrorCopying.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testErrorInterceptor.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testErrorInterceptorGC.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testErrorLineOfContext.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testException.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testExecuteInJSMEnvironment.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testExternalStrings.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testFindSCCs.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testForOfIterator.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testForceLexicalInitialization.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testForwardSetProperty.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testFreshGlobalEvalRedefinition.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testFunctionBinding.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testFunctionProperties.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCAllocator.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCCellPtr.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCChunkPool.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCExactRooting.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCFinalizeCallback.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCGrayMarking.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCHeapBarriers.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCHooks.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCMarking.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCOutOfMemory.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCStoreBufferRemoval.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCUniqueId.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGCWeakCache.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testGetPropertyDescriptor.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testHashTable.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testIndexToString.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testInformalValueTypeName.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testIntString.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testIntern.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testIntlAvailableLocales.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testIsInsideNursery.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testIteratorObject.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJSEvaluateScript.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitDCEinGVN.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitFoldsTo.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitGVN.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitMacroAssembler.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitMinimalFunc.h
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitMoveEmitterCycles-mips32.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitMoveEmitterCycles.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitRValueAlloc.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitRangeAnalysis.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testJitRegisterSet.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testLookup.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testLooselyEqual.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testMappedArrayBuffer.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testMemoryAssociation.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testMutedErrors.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testNewObject.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testNewTargetInvokeConstructor.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testNullRoot.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testNumberToString.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testOOM.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testObjectEmulatingUndefined.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testParseJSON.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testPersistentRooted.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testPreserveJitCode.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testPrintError.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testPrintf.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testPrivateGCThingValue.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testProfileStrings.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testPromise.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testPropCache.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testReadableStream.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testRegExp.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testResolveRecursion.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSABAccounting.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSameValue.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSavedStacks.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testScriptInfo.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testScriptObject.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testScriptSourceCompression.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSetProperty.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSetPropertyIgnoringNamedGetter.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSharedImmutableStringsCache.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSlowScript.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSourcePolicy.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSparseBitmap.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testStringBuffer.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testStringIsArrayIndex.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testStructuredClone.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testSymbol.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testThreadingConditionVariable.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testThreadingExclusiveData.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testThreadingMutex.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testThreadingThread.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testToSignedOrUnsignedInteger.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testTypedArrays.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testUTF8.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testUbiNode.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testUncaughtSymbol.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testValueABI.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testWasmLEB128.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testWeakMap.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testWindowNonConfigurable.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/testXDR.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/tests.cpp
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/tests.h
Examining data/mozjs78-78.4.0/js/src/jsapi-tests/valueABI.c
Examining data/mozjs78-78.4.0/js/src/new-regexp/util/flags.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/util/unicode.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/util/vector.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/util/zone.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/RegExpAPI.cpp
Examining data/mozjs78-78.4.0/js/src/new-regexp/RegExpAPI.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/RegExpTypes.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/gen-regexp-special-case.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/property-sequences.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/property-sequences.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-ast.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-ast.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-bytecode-generator-inl.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-bytecode-generator.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-bytecode-generator.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-bytecode-peephole.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-bytecode-peephole.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-bytecodes.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-bytecodes.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-compiler-tonode.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-compiler.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-compiler.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-dotprinter.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-dotprinter.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-error.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-error.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-interpreter.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-interpreter.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-macro-assembler-arch.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-macro-assembler-tracer.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-macro-assembler-tracer.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-macro-assembler.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-macro-assembler.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-native-macro-assembler.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-nodes.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-parser.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-parser.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-shim.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-shim.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-stack.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp-stack.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/regexp.h
Examining data/mozjs78-78.4.0/js/src/new-regexp/special-case.cc
Examining data/mozjs78-78.4.0/js/src/new-regexp/special-case.h
Examining data/mozjs78-78.4.0/js/src/proxy/BaseProxyHandler.cpp
Examining data/mozjs78-78.4.0/js/src/proxy/CrossCompartmentWrapper.cpp
Examining data/mozjs78-78.4.0/js/src/proxy/DeadObjectProxy.cpp
Examining data/mozjs78-78.4.0/js/src/proxy/DeadObjectProxy.h
Examining data/mozjs78-78.4.0/js/src/proxy/OpaqueCrossCompartmentWrapper.cpp
Examining data/mozjs78-78.4.0/js/src/proxy/Proxy.cpp
Examining data/mozjs78-78.4.0/js/src/proxy/Proxy.h
Examining data/mozjs78-78.4.0/js/src/proxy/ScriptedProxyHandler.cpp
Examining data/mozjs78-78.4.0/js/src/proxy/ScriptedProxyHandler.h
Examining data/mozjs78-78.4.0/js/src/proxy/SecurityWrapper.cpp
Examining data/mozjs78-78.4.0/js/src/proxy/Wrapper.cpp
Examining data/mozjs78-78.4.0/js/src/shell/jsrtfuzzing/jsrtfuzzing.cpp
Examining data/mozjs78-78.4.0/js/src/shell/jsrtfuzzing/jsrtfuzzing.h
Examining data/mozjs78-78.4.0/js/src/shell/ModuleLoader.cpp
Examining data/mozjs78-78.4.0/js/src/shell/ModuleLoader.h
Examining data/mozjs78-78.4.0/js/src/shell/OSObject.cpp
Examining data/mozjs78-78.4.0/js/src/shell/OSObject.h
Examining data/mozjs78-78.4.0/js/src/shell/StringUtils.h
Examining data/mozjs78-78.4.0/js/src/shell/WasmTesting.cpp
Examining data/mozjs78-78.4.0/js/src/shell/WasmTesting.h
Examining data/mozjs78-78.4.0/js/src/shell/js.cpp
Examining data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp
Examining data/mozjs78-78.4.0/js/src/shell/jsoptparse.h
Examining data/mozjs78-78.4.0/js/src/shell/jsshell.cpp
Examining data/mozjs78-78.4.0/js/src/shell/jsshell.h
Examining data/mozjs78-78.4.0/js/src/tests/style/BadIncludes.h
Examining data/mozjs78-78.4.0/js/src/tests/style/BadIncludes2-inl.h
Examining data/mozjs78-78.4.0/js/src/tests/style/BadIncludes2.h
Examining data/mozjs78-78.4.0/js/src/tests/style/BadIncludesOrder-inl.h
Examining data/mozjs78-78.4.0/js/src/tests/style/HeaderCycleA1.h
Examining data/mozjs78-78.4.0/js/src/tests/style/HeaderCycleA2.h
Examining data/mozjs78-78.4.0/js/src/tests/style/HeaderCycleA3.h
Examining data/mozjs78-78.4.0/js/src/tests/style/HeaderCycleB1-inl.h
Examining data/mozjs78-78.4.0/js/src/tests/style/HeaderCycleB2-inl.h
Examining data/mozjs78-78.4.0/js/src/tests/style/HeaderCycleB3-inl.h
Examining data/mozjs78-78.4.0/js/src/tests/style/HeaderCycleB4-inl.h
Examining data/mozjs78-78.4.0/js/src/tests/style/jsheadercycleB5inlines.h
Examining data/mozjs78-78.4.0/js/src/threading/posix/CpuCount.cpp
Examining data/mozjs78-78.4.0/js/src/threading/posix/PosixThread.cpp
Examining data/mozjs78-78.4.0/js/src/threading/posix/ThreadPlatformData.h
Examining data/mozjs78-78.4.0/js/src/threading/windows/CpuCount.cpp
Examining data/mozjs78-78.4.0/js/src/threading/windows/ThreadPlatformData.h
Examining data/mozjs78-78.4.0/js/src/threading/windows/WindowsThread.cpp
Examining data/mozjs78-78.4.0/js/src/threading/ConditionVariable.h
Examining data/mozjs78-78.4.0/js/src/threading/CpuCount.h
Examining data/mozjs78-78.4.0/js/src/threading/ExclusiveData.h
Examining data/mozjs78-78.4.0/js/src/threading/LockGuard.h
Examining data/mozjs78-78.4.0/js/src/threading/Mutex.cpp
Examining data/mozjs78-78.4.0/js/src/threading/Mutex.h
Examining data/mozjs78-78.4.0/js/src/threading/ProtectedData.cpp
Examining data/mozjs78-78.4.0/js/src/threading/ProtectedData.h
Examining data/mozjs78-78.4.0/js/src/threading/Thread.cpp
Examining data/mozjs78-78.4.0/js/src/threading/Thread.h
Examining data/mozjs78-78.4.0/js/src/threading/ThreadId.h
Examining data/mozjs78-78.4.0/js/src/util/AllocPolicy.cpp
Examining data/mozjs78-78.4.0/js/src/util/BitArray.h
Examining data/mozjs78-78.4.0/js/src/util/CheckedArithmetic.h
Examining data/mozjs78-78.4.0/js/src/util/CompleteFile.cpp
Examining data/mozjs78-78.4.0/js/src/util/CompleteFile.h
Examining data/mozjs78-78.4.0/js/src/util/DiagnosticAssertions.h
Examining data/mozjs78-78.4.0/js/src/util/DoubleToString.cpp
Examining data/mozjs78-78.4.0/js/src/util/DoubleToString.h
Examining data/mozjs78-78.4.0/js/src/util/Memory.h
Examining data/mozjs78-78.4.0/js/src/util/NativeStack.cpp
Examining data/mozjs78-78.4.0/js/src/util/NativeStack.h
Examining data/mozjs78-78.4.0/js/src/util/Poison.h
Examining data/mozjs78-78.4.0/js/src/util/Printf.cpp
Examining data/mozjs78-78.4.0/js/src/util/StringBuffer.cpp
Examining data/mozjs78-78.4.0/js/src/util/StringBuffer.h
Examining data/mozjs78-78.4.0/js/src/util/StructuredSpewer.cpp
Examining data/mozjs78-78.4.0/js/src/util/StructuredSpewer.h
Examining data/mozjs78-78.4.0/js/src/util/Text.cpp
Examining data/mozjs78-78.4.0/js/src/util/Text.h
Examining data/mozjs78-78.4.0/js/src/util/TrailingArray.h
Examining data/mozjs78-78.4.0/js/src/util/Unicode.cpp
Examining data/mozjs78-78.4.0/js/src/util/Unicode.h
Examining data/mozjs78-78.4.0/js/src/util/UnicodeNonBMP.h
Examining data/mozjs78-78.4.0/js/src/util/Utility.cpp
Examining data/mozjs78-78.4.0/js/src/util/Windows.h
Examining data/mozjs78-78.4.0/js/src/vm/Activation-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Activation.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Activation.h
Examining data/mozjs78-78.4.0/js/src/vm/ArgumentsObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/ArgumentsObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ArgumentsObject.h
Examining data/mozjs78-78.4.0/js/src/vm/ArrayBufferObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/ArrayBufferObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ArrayBufferObject.h
Examining data/mozjs78-78.4.0/js/src/vm/ArrayBufferObjectMaybeShared.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ArrayBufferViewObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ArrayBufferViewObject.h
Examining data/mozjs78-78.4.0/js/src/vm/ArrayObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/ArrayObject.h
Examining data/mozjs78-78.4.0/js/src/vm/AsyncFunction.cpp
Examining data/mozjs78-78.4.0/js/src/vm/AsyncFunction.h
Examining data/mozjs78-78.4.0/js/src/vm/AsyncFunctionResolveKind.h
Examining data/mozjs78-78.4.0/js/src/vm/AsyncIteration.cpp
Examining data/mozjs78-78.4.0/js/src/vm/AsyncIteration.h
Examining data/mozjs78-78.4.0/js/src/vm/AtomsTable.h
Examining data/mozjs78-78.4.0/js/src/vm/BigIntType.cpp
Examining data/mozjs78-78.4.0/js/src/vm/BigIntType.h
Examining data/mozjs78-78.4.0/js/src/vm/BooleanObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/BooleanObject.h
Examining data/mozjs78-78.4.0/js/src/vm/BuildId.cpp
Examining data/mozjs78-78.4.0/js/src/vm/BytecodeFormatFlags.h
Examining data/mozjs78-78.4.0/js/src/vm/BytecodeIterator-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/BytecodeIterator.h
Examining data/mozjs78-78.4.0/js/src/vm/BytecodeLocation-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/BytecodeLocation.cpp
Examining data/mozjs78-78.4.0/js/src/vm/BytecodeLocation.h
Examining data/mozjs78-78.4.0/js/src/vm/BytecodeUtil-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/BytecodeUtil.cpp
Examining data/mozjs78-78.4.0/js/src/vm/BytecodeUtil.h
Examining data/mozjs78-78.4.0/js/src/vm/Caches-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Caches.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Caches.h
Examining data/mozjs78-78.4.0/js/src/vm/CallNonGenericMethod.cpp
Examining data/mozjs78-78.4.0/js/src/vm/CharacterEncoding.cpp
Examining data/mozjs78-78.4.0/js/src/vm/CheckIsObjectKind.h
Examining data/mozjs78-78.4.0/js/src/vm/CodeCoverage.cpp
Examining data/mozjs78-78.4.0/js/src/vm/CodeCoverage.h
Examining data/mozjs78-78.4.0/js/src/vm/CommonPropertyNames.h
Examining data/mozjs78-78.4.0/js/src/vm/Compartment-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Compartment.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Compartment.h
Examining data/mozjs78-78.4.0/js/src/vm/CompilationAndEvaluation.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Compression.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Compression.h
Examining data/mozjs78-78.4.0/js/src/vm/DateObject.h
Examining data/mozjs78-78.4.0/js/src/vm/DateTime.cpp
Examining data/mozjs78-78.4.0/js/src/vm/DateTime.h
Examining data/mozjs78-78.4.0/js/src/vm/EnvironmentObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.h
Examining data/mozjs78-78.4.0/js/src/vm/EqualityOperations.cpp
Examining data/mozjs78-78.4.0/js/src/vm/EqualityOperations.h
Examining data/mozjs78-78.4.0/js/src/vm/ErrorObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/ErrorObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ErrorObject.h
Examining data/mozjs78-78.4.0/js/src/vm/ErrorReporting.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ErrorReporting.h
Examining data/mozjs78-78.4.0/js/src/vm/Exception.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ForOfIterator.cpp
Examining data/mozjs78-78.4.0/js/src/vm/FrameIter-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/FrameIter.cpp
Examining data/mozjs78-78.4.0/js/src/vm/FrameIter.h
Examining data/mozjs78-78.4.0/js/src/vm/FunctionFlags.cpp
Examining data/mozjs78-78.4.0/js/src/vm/FunctionFlags.h
Examining data/mozjs78-78.4.0/js/src/vm/FunctionPrefixKind.h
Examining data/mozjs78-78.4.0/js/src/vm/GeckoProfiler-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/GeckoProfiler.cpp
Examining data/mozjs78-78.4.0/js/src/vm/GeckoProfiler.h
Examining data/mozjs78-78.4.0/js/src/vm/GeneratorAndAsyncKind.h
Examining data/mozjs78-78.4.0/js/src/vm/GeneratorObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/GeneratorObject.h
Examining data/mozjs78-78.4.0/js/src/vm/GeneratorResumeKind.h
Examining data/mozjs78-78.4.0/js/src/vm/GlobalObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/GlobalObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/GlobalObject.h
Examining data/mozjs78-78.4.0/js/src/vm/HelperThreads.cpp
Examining data/mozjs78-78.4.0/js/src/vm/HelperThreads.h
Examining data/mozjs78-78.4.0/js/src/vm/Id.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Initialization.cpp
Examining data/mozjs78-78.4.0/js/src/vm/InlineCharBuffer-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Instrumentation.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Instrumentation.h
Examining data/mozjs78-78.4.0/js/src/vm/Interpreter-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Interpreter.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Interpreter.h
Examining data/mozjs78-78.4.0/js/src/vm/IsGivenTypeObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Iteration.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Iteration.h
Examining data/mozjs78-78.4.0/js/src/vm/JSAtom-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/JSAtom.cpp
Examining data/mozjs78-78.4.0/js/src/vm/JSAtom.h
Examining data/mozjs78-78.4.0/js/src/vm/JSContext-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/JSContext.cpp
Examining data/mozjs78-78.4.0/js/src/vm/JSContext.h
Examining data/mozjs78-78.4.0/js/src/vm/JSFunction-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/JSFunction.cpp
Examining data/mozjs78-78.4.0/js/src/vm/JSFunction.h
Examining data/mozjs78-78.4.0/js/src/vm/JSONParser.cpp
Examining data/mozjs78-78.4.0/js/src/vm/JSONParser.h
Examining data/mozjs78-78.4.0/js/src/vm/JSONPrinter.cpp
Examining data/mozjs78-78.4.0/js/src/vm/JSONPrinter.h
Examining data/mozjs78-78.4.0/js/src/vm/JSObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/JSObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/JSObject.h
Examining data/mozjs78-78.4.0/js/src/vm/JSScript-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/JSScript.cpp
Examining data/mozjs78-78.4.0/js/src/vm/JSScript.h
Examining data/mozjs78-78.4.0/js/src/vm/JitActivation.cpp
Examining data/mozjs78-78.4.0/js/src/vm/JitActivation.h
Examining data/mozjs78-78.4.0/js/src/vm/List-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/List.cpp
Examining data/mozjs78-78.4.0/js/src/vm/List.h
Examining data/mozjs78-78.4.0/js/src/vm/MallocProvider.h
Examining data/mozjs78-78.4.0/js/src/vm/MatchPairs.h
Examining data/mozjs78-78.4.0/js/src/vm/MemoryMetrics.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ModuleBuilder.h
Examining data/mozjs78-78.4.0/js/src/vm/Modules.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Monitor.h
Examining data/mozjs78-78.4.0/js/src/vm/MutexIDs.h
Examining data/mozjs78-78.4.0/js/src/vm/NativeObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/NativeObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/NativeObject.h
Examining data/mozjs78-78.4.0/js/src/vm/NumberObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/NumberObject.h
Examining data/mozjs78-78.4.0/js/src/vm/ObjectGroup-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/ObjectGroup.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ObjectGroup.h
Examining data/mozjs78-78.4.0/js/src/vm/ObjectOperations-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/ObjectOperations.h
Examining data/mozjs78-78.4.0/js/src/vm/OffThreadPromiseRuntimeState.cpp
Examining data/mozjs78-78.4.0/js/src/vm/OffThreadPromiseRuntimeState.h
Examining data/mozjs78-78.4.0/js/src/vm/OffThreadScriptCompilation.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Opcodes.h
Examining data/mozjs78-78.4.0/js/src/vm/PIC.cpp
Examining data/mozjs78-78.4.0/js/src/vm/PIC.h
Examining data/mozjs78-78.4.0/js/src/vm/PlainObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/PlainObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/PlainObject.h
Examining data/mozjs78-78.4.0/js/src/vm/Printer.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Printer.h
Examining data/mozjs78-78.4.0/js/src/vm/Probes-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Probes.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Probes.h
Examining data/mozjs78-78.4.0/js/src/vm/ProfilingStack.cpp
Examining data/mozjs78-78.4.0/js/src/vm/PromiseLookup.cpp
Examining data/mozjs78-78.4.0/js/src/vm/PromiseLookup.h
Examining data/mozjs78-78.4.0/js/src/vm/PromiseObject.h
Examining data/mozjs78-78.4.0/js/src/vm/ProxyObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ProxyObject.h
Examining data/mozjs78-78.4.0/js/src/vm/Realm-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Realm.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Realm.h
Examining data/mozjs78-78.4.0/js/src/vm/ReceiverGuard-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/ReceiverGuard.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ReceiverGuard.h
Examining data/mozjs78-78.4.0/js/src/vm/RegExpObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/RegExpObject.h
Examining data/mozjs78-78.4.0/js/src/vm/RegExpShared.h
Examining data/mozjs78-78.4.0/js/src/vm/RegExpStatics.cpp
Examining data/mozjs78-78.4.0/js/src/vm/RegExpStatics.h
Examining data/mozjs78-78.4.0/js/src/vm/RegExpStaticsObject.h
Examining data/mozjs78-78.4.0/js/src/vm/Runtime.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Runtime.h
Examining data/mozjs78-78.4.0/js/src/vm/SavedFrame.h
Examining data/mozjs78-78.4.0/js/src/vm/SavedStacks-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/SavedStacks.cpp
Examining data/mozjs78-78.4.0/js/src/vm/SavedStacks.h
Examining data/mozjs78-78.4.0/js/src/vm/Scope.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Scope.h
Examining data/mozjs78-78.4.0/js/src/vm/ScopeKind.h
Examining data/mozjs78-78.4.0/js/src/vm/SelfHosting.cpp
Examining data/mozjs78-78.4.0/js/src/vm/SelfHosting.h
Examining data/mozjs78-78.4.0/js/src/vm/Shape-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Shape.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Shape.h
Examining data/mozjs78-78.4.0/js/src/vm/SharedArrayObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/SharedArrayObject.h
Examining data/mozjs78-78.4.0/js/src/vm/SharedImmutableStringsCache-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/SharedImmutableStringsCache.cpp
Examining data/mozjs78-78.4.0/js/src/vm/SharedImmutableStringsCache.h
Examining data/mozjs78-78.4.0/js/src/vm/SharedMem.h
Examining data/mozjs78-78.4.0/js/src/vm/SharedStencil.h
Examining data/mozjs78-78.4.0/js/src/vm/SourceHook.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Stack-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/Stack.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Stack.h
Examining data/mozjs78-78.4.0/js/src/vm/StencilEnums.h
Examining data/mozjs78-78.4.0/js/src/vm/StringObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/StringObject.h
Examining data/mozjs78-78.4.0/js/src/vm/StringType-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/StringType.cpp
Parsing failed to find end of parameter list; semicolon terminated it in (0b1111'0000 | (astral >> 18));
          buffer[1] = char(0b1000'0000 | ((astral >> 12) & 0b11'1111));
          buffer[2] = char(0b1000'0000 | ((astral >> 6) & 0b11'1111));
          buffer[3] = cha
Examining data/mozjs78-78.4.0/js/src/vm/StringType.h
Examining data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp
Examining data/mozjs78-78.4.0/js/src/vm/SymbolType.cpp
Examining data/mozjs78-78.4.0/js/src/vm/SymbolType.h
Examining data/mozjs78-78.4.0/js/src/vm/TaggedProto.cpp
Examining data/mozjs78-78.4.0/js/src/vm/TaggedProto.h
Examining data/mozjs78-78.4.0/js/src/vm/ThrowMsgKind.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ThrowMsgKind.h
Examining data/mozjs78-78.4.0/js/src/vm/Time.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Time.h
Examining data/mozjs78-78.4.0/js/src/vm/ToSource.cpp
Examining data/mozjs78-78.4.0/js/src/vm/ToSource.h
Examining data/mozjs78-78.4.0/js/src/vm/TraceLogging.cpp
Examining data/mozjs78-78.4.0/js/src/vm/TraceLogging.h
Examining data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.cpp
Examining data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.h
Examining data/mozjs78-78.4.0/js/src/vm/TraceLoggingTypes.cpp
Examining data/mozjs78-78.4.0/js/src/vm/TraceLoggingTypes.h
Examining data/mozjs78-78.4.0/js/src/vm/TypeInference-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/TypeInference.cpp
Examining data/mozjs78-78.4.0/js/src/vm/TypeInference.h
Examining data/mozjs78-78.4.0/js/src/vm/TypeSet.h
Examining data/mozjs78-78.4.0/js/src/vm/TypedArrayObject-inl.h
Examining data/mozjs78-78.4.0/js/src/vm/TypedArrayObject.cpp
Examining data/mozjs78-78.4.0/js/src/vm/TypedArrayObject.h
Examining data/mozjs78-78.4.0/js/src/vm/UbiNode.cpp
Examining data/mozjs78-78.4.0/js/src/vm/UbiNodeCensus.cpp
Examining data/mozjs78-78.4.0/js/src/vm/UbiNodeShortestPaths.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Value.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Warnings.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Warnings.h
Examining data/mozjs78-78.4.0/js/src/vm/WrapperObject.h
Examining data/mozjs78-78.4.0/js/src/vm/Xdr.cpp
Examining data/mozjs78-78.4.0/js/src/vm/Xdr.h
Examining data/mozjs78-78.4.0/js/src/vtune/legacy/ittnotify.h
Examining data/mozjs78-78.4.0/js/src/vtune/VTuneWrapper.cpp
Examining data/mozjs78-78.4.0/js/src/vtune/VTuneWrapper.h
Examining data/mozjs78-78.4.0/js/src/vtune/disable_warnings.h
Examining data/mozjs78-78.4.0/js/src/vtune/ittnotify.h
Examining data/mozjs78-78.4.0/js/src/vtune/ittnotify_config.h
Examining data/mozjs78-78.4.0/js/src/vtune/ittnotify_static.c
Examining data/mozjs78-78.4.0/js/src/vtune/ittnotify_static.h
Examining data/mozjs78-78.4.0/js/src/vtune/ittnotify_types.h
Examining data/mozjs78-78.4.0/js/src/vtune/jitprofiling.c
Examining data/mozjs78-78.4.0/js/src/vtune/jitprofiling.h
Examining data/mozjs78-78.4.0/js/src/wasm/cranelift/baldrapi.h
Examining data/mozjs78-78.4.0/js/src/wasm/cranelift/clifapi.h
Examining data/mozjs78-78.4.0/js/src/wasm/AsmJS.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/AsmJS.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmBuiltins.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmBuiltins.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmCode.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmCode.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmCompile.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmCompile.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmConstants.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmCraneliftCompile.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmCraneliftCompile.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmDebug.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmDebug.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmFrameIter.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmFrameIter.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmGC.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmGC.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmGenerator.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmGenerator.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmInstance.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmInstance.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmJS.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmModule.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmModule.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmOpIter.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmOpIter.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmProcess.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmProcess.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmRealm.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmRealm.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmSerialize.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmSignalHandlers.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmStubs.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmStubs.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmTable.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmTable.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmTypes.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmTypes.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmUtility.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmValidate.cpp
Examining data/mozjs78-78.4.0/js/src/wasm/WasmValidate.h
Examining data/mozjs78-78.4.0/js/src/wasm/WasmSignalHandlers.cpp
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/API/Memory.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/API/Memory.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Allocator.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Allocator.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/ArgParse.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/ArgParse.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Bitset.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Bitset.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Comparison.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Defines.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Format.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Format.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/List.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/List.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Object.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Status.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/String.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Types.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Vector.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Vector.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Zycore.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/Zycore.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zycore/ZycoreString.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Generated/EnumISAExt.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Generated/EnumISASet.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Generated/EnumInstructionCategory.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Generated/EnumMnemonic.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Generated/EnumRegister.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Internal/DecoderData.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Internal/FormatterATT.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Internal/FormatterBase.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Internal/FormatterIntel.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Internal/SharedData.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Internal/String.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Decoder.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Decoder.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/DecoderData.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/DecoderTypes.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Formatter.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Formatter.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/FormatterATT.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/FormatterBase.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/FormatterBuffer.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/FormatterBuffer.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/FormatterIntel.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/MetaInfo.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/MetaInfo.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Mnemonic.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Mnemonic.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Register.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Register.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/SharedData.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/SharedTypes.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/ShortString.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Status.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Utils.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Utils.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Zydis.c
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/Zydis.h
Examining data/mozjs78-78.4.0/js/src/zydis/Zydis/ZydisString.c
Examining data/mozjs78-78.4.0/js/src/zydis/ZycoreExportConfig.h
Examining data/mozjs78-78.4.0/js/src/zydis/ZydisAPI.cpp
Examining data/mozjs78-78.4.0/js/src/zydis/ZydisAPI.h
Examining data/mozjs78-78.4.0/js/src/zydis/ZydisExportConfig.h
Examining data/mozjs78-78.4.0/memory/build/Mutex.h
Examining data/mozjs78-78.4.0/memory/build/Utils.h
Examining data/mozjs78-78.4.0/memory/build/fallback.cpp
Examining data/mozjs78-78.4.0/memory/build/malloc_decls.h
Examining data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp
Examining data/mozjs78-78.4.0/memory/build/mozjemalloc.h
Examining data/mozjs78-78.4.0/memory/build/mozjemalloc_types.h
Examining data/mozjs78-78.4.0/memory/build/mozmemory.h
Examining data/mozjs78-78.4.0/memory/build/mozmemory_wrap.cpp
Examining data/mozjs78-78.4.0/memory/build/mozmemory_wrap.h
Examining data/mozjs78-78.4.0/memory/build/rb.h
Examining data/mozjs78-78.4.0/memory/build/replace_malloc.h
Examining data/mozjs78-78.4.0/memory/build/replace_malloc_bridge.h
Examining data/mozjs78-78.4.0/memory/build/zone.c
Examining data/mozjs78-78.4.0/memory/mozalloc/cxxalloc.cpp
Examining data/mozjs78-78.4.0/memory/mozalloc/cxxalloc.h
Examining data/mozjs78-78.4.0/memory/mozalloc/mozalloc.cpp
Examining data/mozjs78-78.4.0/memory/mozalloc/mozalloc.h
Examining data/mozjs78-78.4.0/memory/mozalloc/mozalloc_abort.cpp
Examining data/mozjs78-78.4.0/memory/mozalloc/mozalloc_abort.h
Examining data/mozjs78-78.4.0/memory/mozalloc/mozalloc_oom.cpp
Examining data/mozjs78-78.4.0/memory/mozalloc/mozalloc_oom.h
Examining data/mozjs78-78.4.0/memory/mozalloc/msvc_raise_wrappers.cpp
Examining data/mozjs78-78.4.0/memory/mozalloc/throw_gcc.h
Examining data/mozjs78-78.4.0/memory/mozalloc/winheap.cpp
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/bignum-dtoa.cc
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/bignum-dtoa.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/bignum.cc
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/bignum.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/cached-powers.cc
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/cached-powers.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/diy-fp.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/double-conversion.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/double-to-string.cc
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/double-to-string.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/fast-dtoa.cc
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/fast-dtoa.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/fixed-dtoa.cc
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/fixed-dtoa.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/ieee.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/string-to-double.cc
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/string-to-double.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/strtod.cc
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/strtod.h
Examining data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/utils.h
Examining data/mozjs78-78.4.0/mfbt/lz4/lz4.c
Examining data/mozjs78-78.4.0/mfbt/lz4/lz4.h
Examining data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c
Examining data/mozjs78-78.4.0/mfbt/lz4/lz4frame.h
Examining data/mozjs78-78.4.0/mfbt/lz4/lz4frame_static.h
Examining data/mozjs78-78.4.0/mfbt/lz4/lz4hc.c
Examining data/mozjs78-78.4.0/mfbt/lz4/lz4hc.h
Examining data/mozjs78-78.4.0/mfbt/lz4/xxh3.h
Examining data/mozjs78-78.4.0/mfbt/lz4/xxhash.c
Examining data/mozjs78-78.4.0/mfbt/lz4/xxhash.h
Examining data/mozjs78-78.4.0/mfbt/tests/gtest/TestAlgorithm.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/gtest/TestBuffer.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/gtest/TestInitializedOnce.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/gtest/TestLinkedList.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/gtest/TestMozDbg.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/gtest/TestResultExtensions.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/gtest/TestSpan.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestAlgorithm.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestArray.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestArrayUtils.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestAtomics.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestBinarySearch.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestBloomFilter.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestBufferList.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestCasting.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestCeilingFloor.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestCheckedInt.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestCompactPair.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestCountPopulation.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestCountZeroes.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestDefineEnum.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestDoublyLinkedList.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestEndian.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestEnumSet.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestEnumTypeTraits.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestEnumeratedArray.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestFastBernoulliTrial.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestFloatingPoint.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestFunctionRef.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestFunctionTypeTraits.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestHashTable.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestIntegerRange.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestJSONWriter.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestLinkedList.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestMacroArgs.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestMacroForEach.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestMathAlgorithms.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestMaybe.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestNonDereferenceable.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestNotNull.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestRandomNum.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestRange.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestRefPtr.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestResult.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestRollingMean.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestSHA1.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestSPSCQueue.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestSaturate.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestScopeExit.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestSegmentedVector.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestSmallPointerArray.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestSplayTree.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestTemplateLib.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestTextUtils.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestThreadSafeWeakPtr.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestTuple.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestTypeTraits.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestTypedEnum.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestUniquePtr.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestUtf8.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestVariant.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestVector.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestWeakPtr.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestWrappingOperations.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestXorShift128PlusRNG.cpp
Examining data/mozjs78-78.4.0/mfbt/tests/TestPoisonArea.cpp
Examining data/mozjs78-78.4.0/mfbt/Algorithm.h
Examining data/mozjs78-78.4.0/mfbt/Alignment.h
Examining data/mozjs78-78.4.0/mfbt/AllocPolicy.h
Examining data/mozjs78-78.4.0/mfbt/AlreadyAddRefed.h
Examining data/mozjs78-78.4.0/mfbt/Array.h
Examining data/mozjs78-78.4.0/mfbt/ArrayUtils.h
Examining data/mozjs78-78.4.0/mfbt/Assertions.cpp
Examining data/mozjs78-78.4.0/mfbt/Assertions.h
Examining data/mozjs78-78.4.0/mfbt/Atomics.h
Examining data/mozjs78-78.4.0/mfbt/Attributes.h
Examining data/mozjs78-78.4.0/mfbt/BinarySearch.h
Examining data/mozjs78-78.4.0/mfbt/BloomFilter.h
Examining data/mozjs78-78.4.0/mfbt/Buffer.h
Examining data/mozjs78-78.4.0/mfbt/BufferList.h
Examining data/mozjs78-78.4.0/mfbt/Casting.h
Examining data/mozjs78-78.4.0/mfbt/ChaosMode.cpp
Examining data/mozjs78-78.4.0/mfbt/ChaosMode.h
Examining data/mozjs78-78.4.0/mfbt/Char16.h
Examining data/mozjs78-78.4.0/mfbt/CheckedInt.h
Examining data/mozjs78-78.4.0/mfbt/CompactPair.h
Examining data/mozjs78-78.4.0/mfbt/Compiler.h
Examining data/mozjs78-78.4.0/mfbt/Compression.cpp
Examining data/mozjs78-78.4.0/mfbt/Compression.h
Examining data/mozjs78-78.4.0/mfbt/DbgMacro.h
Examining data/mozjs78-78.4.0/mfbt/DebugOnly.h
Examining data/mozjs78-78.4.0/mfbt/DefineEnum.h
Examining data/mozjs78-78.4.0/mfbt/DoublyLinkedList.h
Examining data/mozjs78-78.4.0/mfbt/EndianUtils.h
Examining data/mozjs78-78.4.0/mfbt/EnumSet.h
Examining data/mozjs78-78.4.0/mfbt/EnumTypeTraits.h
Examining data/mozjs78-78.4.0/mfbt/EnumeratedArray.h
Examining data/mozjs78-78.4.0/mfbt/EnumeratedRange.h
Examining data/mozjs78-78.4.0/mfbt/FStream.h
Examining data/mozjs78-78.4.0/mfbt/FastBernoulliTrial.h
Examining data/mozjs78-78.4.0/mfbt/FloatingPoint.cpp
Examining data/mozjs78-78.4.0/mfbt/FloatingPoint.h
Examining data/mozjs78-78.4.0/mfbt/FunctionRef.h
Examining data/mozjs78-78.4.0/mfbt/FunctionTypeTraits.h
Examining data/mozjs78-78.4.0/mfbt/GuardObjects.h
Examining data/mozjs78-78.4.0/mfbt/HashFunctions.cpp
Examining data/mozjs78-78.4.0/mfbt/HashFunctions.h
Examining data/mozjs78-78.4.0/mfbt/HashTable.h
Examining data/mozjs78-78.4.0/mfbt/HelperMacros.h
Examining data/mozjs78-78.4.0/mfbt/InitializedOnce.h
Examining data/mozjs78-78.4.0/mfbt/IntegerPrintfMacros.h
Examining data/mozjs78-78.4.0/mfbt/IntegerRange.h
Examining data/mozjs78-78.4.0/mfbt/IntegerTypeTraits.h
Examining data/mozjs78-78.4.0/mfbt/JSONWriter.cpp
Examining data/mozjs78-78.4.0/mfbt/JSONWriter.h
Examining data/mozjs78-78.4.0/mfbt/JsRust.h
Examining data/mozjs78-78.4.0/mfbt/Latin1.h
Examining data/mozjs78-78.4.0/mfbt/Likely.h
Examining data/mozjs78-78.4.0/mfbt/LinkedList.h
Examining data/mozjs78-78.4.0/mfbt/LinuxSignal.h
Examining data/mozjs78-78.4.0/mfbt/MacroArgs.h
Examining data/mozjs78-78.4.0/mfbt/MacroForEach.h
Examining data/mozjs78-78.4.0/mfbt/MathAlgorithms.h
Examining data/mozjs78-78.4.0/mfbt/Maybe.h
Examining data/mozjs78-78.4.0/mfbt/MaybeOneOf.h
Examining data/mozjs78-78.4.0/mfbt/MemoryChecking.h
Examining data/mozjs78-78.4.0/mfbt/MemoryReporting.h
Examining data/mozjs78-78.4.0/mfbt/NonDereferenceable.h
Examining data/mozjs78-78.4.0/mfbt/NotNull.h
Examining data/mozjs78-78.4.0/mfbt/Opaque.h
Examining data/mozjs78-78.4.0/mfbt/OperatorNewExtensions.h
Examining data/mozjs78-78.4.0/mfbt/Path.h
Examining data/mozjs78-78.4.0/mfbt/PodOperations.h
Examining data/mozjs78-78.4.0/mfbt/Poison.cpp
Examining data/mozjs78-78.4.0/mfbt/Poison.h
Examining data/mozjs78-78.4.0/mfbt/RandomNum.cpp
Examining data/mozjs78-78.4.0/mfbt/RandomNum.h
Examining data/mozjs78-78.4.0/mfbt/Range.h
Examining data/mozjs78-78.4.0/mfbt/RangedArray.h
Examining data/mozjs78-78.4.0/mfbt/RangedPtr.h
Examining data/mozjs78-78.4.0/mfbt/ReentrancyGuard.h
Examining data/mozjs78-78.4.0/mfbt/RefCountType.h
Examining data/mozjs78-78.4.0/mfbt/RefCounted.h
Examining data/mozjs78-78.4.0/mfbt/RefPtr.h
Examining data/mozjs78-78.4.0/mfbt/Result.h
Examining data/mozjs78-78.4.0/mfbt/ResultExtensions.h
Examining data/mozjs78-78.4.0/mfbt/ReverseIterator.h
Examining data/mozjs78-78.4.0/mfbt/RollingMean.h
Examining data/mozjs78-78.4.0/mfbt/SHA1.cpp
Examining data/mozjs78-78.4.0/mfbt/SHA1.h
Examining data/mozjs78-78.4.0/mfbt/SPSCQueue.h
Examining data/mozjs78-78.4.0/mfbt/Saturate.h
Examining data/mozjs78-78.4.0/mfbt/ScopeExit.h
Examining data/mozjs78-78.4.0/mfbt/Scoped.h
Examining data/mozjs78-78.4.0/mfbt/SegmentedVector.h
Examining data/mozjs78-78.4.0/mfbt/SharedLibrary.h
Examining data/mozjs78-78.4.0/mfbt/SmallPointerArray.h
Examining data/mozjs78-78.4.0/mfbt/Span.h
Examining data/mozjs78-78.4.0/mfbt/SplayTree.h
Examining data/mozjs78-78.4.0/mfbt/Sprintf.h
Examining data/mozjs78-78.4.0/mfbt/StaticAnalysisFunctions.h
Examining data/mozjs78-78.4.0/mfbt/TaggedAnonymousMemory.cpp
Examining data/mozjs78-78.4.0/mfbt/TaggedAnonymousMemory.h
Examining data/mozjs78-78.4.0/mfbt/Tainting.h
Examining data/mozjs78-78.4.0/mfbt/TemplateLib.h
Examining data/mozjs78-78.4.0/mfbt/TextUtils.h
Examining data/mozjs78-78.4.0/mfbt/ThreadLocal.h
Examining data/mozjs78-78.4.0/mfbt/ThreadSafeWeakPtr.h
Examining data/mozjs78-78.4.0/mfbt/ToString.h
Examining data/mozjs78-78.4.0/mfbt/TsanOptions.h
Examining data/mozjs78-78.4.0/mfbt/Tuple.h
Examining data/mozjs78-78.4.0/mfbt/TypeTraits.h
Examining data/mozjs78-78.4.0/mfbt/TypedEnumBits.h
Examining data/mozjs78-78.4.0/mfbt/Types.h
Examining data/mozjs78-78.4.0/mfbt/UniquePtr.h
Examining data/mozjs78-78.4.0/mfbt/UniquePtrExtensions.cpp
Examining data/mozjs78-78.4.0/mfbt/UniquePtrExtensions.h
Examining data/mozjs78-78.4.0/mfbt/Unused.cpp
Examining data/mozjs78-78.4.0/mfbt/Unused.h
Examining data/mozjs78-78.4.0/mfbt/Utf8.cpp
Examining data/mozjs78-78.4.0/mfbt/Utf8.h
Examining data/mozjs78-78.4.0/mfbt/Variant.h
Examining data/mozjs78-78.4.0/mfbt/Vector.h
Examining data/mozjs78-78.4.0/mfbt/WeakPtr.h
Examining data/mozjs78-78.4.0/mfbt/WindowsVersion.h
Examining data/mozjs78-78.4.0/mfbt/WrappingOperations.h
Examining data/mozjs78-78.4.0/mfbt/XorShift128PlusRNG.h
Examining data/mozjs78-78.4.0/mfbt/fallible.h
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_acos.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_acosh.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_asin.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_atan2.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_atanh.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_cosh.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_exp.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_hypot.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_log.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_log10.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_log2.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_pow.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/e_sinh.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/fdlibm.h
Examining data/mozjs78-78.4.0/modules/fdlibm/src/k_exp.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/k_log.h
Examining data/mozjs78-78.4.0/modules/fdlibm/src/math_private.h
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_asinh.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_atan.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_cbrt.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_ceil.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_ceilf.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_copysign.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_expm1.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_fabs.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_floor.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_floorf.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_log1p.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_nearbyint.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_rint.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_rintf.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_scalbn.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_tanh.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_trunc.cpp
Examining data/mozjs78-78.4.0/modules/fdlibm/src/s_truncf.cpp
Examining data/mozjs78-78.4.0/modules/zlib/src/adler32.c
Examining data/mozjs78-78.4.0/modules/zlib/src/compress.c
Examining data/mozjs78-78.4.0/modules/zlib/src/crc32.c
Examining data/mozjs78-78.4.0/modules/zlib/src/crc32.h
Examining data/mozjs78-78.4.0/modules/zlib/src/deflate.c
Examining data/mozjs78-78.4.0/modules/zlib/src/deflate.h
Examining data/mozjs78-78.4.0/modules/zlib/src/gzclose.c
Examining data/mozjs78-78.4.0/modules/zlib/src/gzguts.h
Examining data/mozjs78-78.4.0/modules/zlib/src/gzlib.c
Examining data/mozjs78-78.4.0/modules/zlib/src/gzread.c
Examining data/mozjs78-78.4.0/modules/zlib/src/gzwrite.c
Examining data/mozjs78-78.4.0/modules/zlib/src/infback.c
Examining data/mozjs78-78.4.0/modules/zlib/src/inffast.c
Examining data/mozjs78-78.4.0/modules/zlib/src/inffast.h
Examining data/mozjs78-78.4.0/modules/zlib/src/inffixed.h
Examining data/mozjs78-78.4.0/modules/zlib/src/inflate.c
Examining data/mozjs78-78.4.0/modules/zlib/src/inflate.h
Examining data/mozjs78-78.4.0/modules/zlib/src/inftrees.c
Examining data/mozjs78-78.4.0/modules/zlib/src/inftrees.h
Examining data/mozjs78-78.4.0/modules/zlib/src/mozzconf.h
Examining data/mozjs78-78.4.0/modules/zlib/src/trees.c
Examining data/mozjs78-78.4.0/modules/zlib/src/trees.h
Examining data/mozjs78-78.4.0/modules/zlib/src/uncompr.c
Examining data/mozjs78-78.4.0/modules/zlib/src/zconf.h
Examining data/mozjs78-78.4.0/modules/zlib/src/zlib.h
Examining data/mozjs78-78.4.0/modules/zlib/src/zutil.c
Examining data/mozjs78-78.4.0/modules/zlib/src/zutil.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/vtune/ittnotify.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/EHABIStackWalk.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/EHABIStackWalk.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/PageInformation.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/PageInformation.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/PlatformMacros.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBuffer.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBuffer.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBufferEntry.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBufferEntry.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileJSONWriter.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfiledThreadData.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfiledThreadData.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfilerBacktrace.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfilerBacktrace.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfilerMarkerPayload.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfilingCategory.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfilingStack.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/RegisteredThread.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/RegisteredThread.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/ThreadInfo.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/VTuneProfiler.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/VTuneProfiler.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform-linux-android.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform-macos.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform-win32.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-linux.cc
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-macos.cc
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-win32.cc
Parsing failed to find end of parameter list; semicolon terminated it in (moduleNameStr.cbegin(), moduleNameStr.cend(),
                   detoured_dll.cbegin(), detoured_dll.cend(),
                   [](char aModuleChar, char aDetouredChar) {
                     return 
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/AutoObjectMapper.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/AutoObjectMapper.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulCommon.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulCommonExt.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarfExt.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarfInt.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarfSummariser.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarfSummariser.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulElf.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulElfExt.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulElfInt.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMainInt.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/platform-linux-lul.cpp
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/lul/platform-linux-lul.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/BaseProfileJSONWriter.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/BaseProfiler.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/BaseProfilerCounts.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/BaseProfilerDetail.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/BaseProfilerMarkerPayload.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/BaseProfilerSharedLibraries.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/BaseProfilingCategory.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/BaseProfilingStack.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/BlocksRingBuffer.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/ModuloBuffer.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/PowerOfTwo.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferChunk.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferChunkManager.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferChunkManagerSingle.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferChunkManagerWithLocalLimit.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferControlledChunkManager.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferEntrySerialization.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferIndex.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileChunkedBuffer.h
Examining data/mozjs78-78.4.0/mozglue/baseprofiler/public/leb128iterator.h
Examining data/mozjs78-78.4.0/mozglue/build/AsanOptions.cpp
Examining data/mozjs78-78.4.0/mozglue/build/BionicGlue.cpp
Examining data/mozjs78-78.4.0/mozglue/build/SSE.cpp
Examining data/mozjs78-78.4.0/mozglue/build/SSE.h
Examining data/mozjs78-78.4.0/mozglue/build/TsanOptions.cpp
Examining data/mozjs78-78.4.0/mozglue/build/UbsanOptions.cpp
Examining data/mozjs78-78.4.0/mozglue/build/arm.cpp
Examining data/mozjs78-78.4.0/mozglue/build/arm.h
Examining data/mozjs78-78.4.0/mozglue/build/dummy.cpp
Examining data/mozjs78-78.4.0/mozglue/build/mips.cpp
Examining data/mozjs78-78.4.0/mozglue/build/mips.h
Examining data/mozjs78-78.4.0/mozglue/build/ppc.cpp
Examining data/mozjs78-78.4.0/mozglue/build/ppc.h
Examining data/mozjs78-78.4.0/mozglue/misc/decimal/Decimal.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/decimal/Decimal.h
Examining data/mozjs78-78.4.0/mozglue/misc/decimal/DoubleConversion.h
Examining data/mozjs78-78.4.0/mozglue/misc/decimal/moz-decimal-utils.h
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/Arm64.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/Arm64.h
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/MMPolicies.h
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/PatcherBase.h
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/PatcherDetour.h
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/PatcherNopSpace.h
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/RangeMap.h
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/TargetFunction.h
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/Trampoline.h
Examining data/mozjs78-78.4.0/mozglue/misc/interceptor/VMSharingPolicies.h
Examining data/mozjs78-78.4.0/mozglue/misc/AutoProfilerLabel.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/AutoProfilerLabel.h
Examining data/mozjs78-78.4.0/mozglue/misc/ConditionVariable_posix.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/ConditionVariable_windows.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/Debug.h
Examining data/mozjs78-78.4.0/mozglue/misc/DynamicallyLinkedFunctionPtr.h
Examining data/mozjs78-78.4.0/mozglue/misc/ImportDir.h
Examining data/mozjs78-78.4.0/mozglue/misc/MmapFaultHandler.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/MmapFaultHandler.h
Examining data/mozjs78-78.4.0/mozglue/misc/MutexPlatformData_posix.h
Examining data/mozjs78-78.4.0/mozglue/misc/MutexPlatformData_windows.h
Examining data/mozjs78-78.4.0/mozglue/misc/Mutex_posix.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/Mutex_windows.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/NativeNt.h
Examining data/mozjs78-78.4.0/mozglue/misc/PlatformConditionVariable.h
Examining data/mozjs78-78.4.0/mozglue/misc/PlatformMutex.h
Examining data/mozjs78-78.4.0/mozglue/misc/Printf.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/Printf.h
Examining data/mozjs78-78.4.0/mozglue/misc/StackWalk.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/StackWalk.h
Examining data/mozjs78-78.4.0/mozglue/misc/StackWalk_windows.h
Examining data/mozjs78-78.4.0/mozglue/misc/TimeStamp.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/TimeStamp.h
Examining data/mozjs78-78.4.0/mozglue/misc/TimeStamp_darwin.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/TimeStamp_posix.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/TimeStamp_windows.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/TimeStamp_windows.h
Examining data/mozjs78-78.4.0/mozglue/misc/WinUtils.h
Examining data/mozjs78-78.4.0/mozglue/misc/WindowsMapRemoteView.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/WindowsMapRemoteView.h
Examining data/mozjs78-78.4.0/mozglue/misc/WindowsProcessMitigations.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/WindowsProcessMitigations.h
Examining data/mozjs78-78.4.0/mozglue/misc/WindowsUnicode.cpp
Examining data/mozjs78-78.4.0/mozglue/misc/WindowsUnicode.h
Examining data/mozjs78-78.4.0/mozglue/misc/nsWindowsDllInterceptor.h
Examining data/mozjs78-78.4.0/mozglue/static/rust/wrappers.cpp
Examining data/mozjs78-78.4.0/nsprpub/config/gcc_hidden.h
Examining data/mozjs78-78.4.0/nsprpub/config/libc_r.h
Examining data/mozjs78-78.4.0/nsprpub/config/now.c
Examining data/mozjs78-78.4.0/nsprpub/config/nsinstall.c
Examining data/mozjs78-78.4.0/nsprpub/config/pathsub.h
Examining data/mozjs78-78.4.0/nsprpub/config/prdepend.h
Examining data/mozjs78-78.4.0/nsprpub/lib/ds/plarena.c
Examining data/mozjs78-78.4.0/nsprpub/lib/ds/plarena.h
Examining data/mozjs78-78.4.0/nsprpub/lib/ds/plarenas.h
Examining data/mozjs78-78.4.0/nsprpub/lib/ds/plhash.c
Examining data/mozjs78-78.4.0/nsprpub/lib/ds/plhash.h
Examining data/mozjs78-78.4.0/nsprpub/lib/ds/plvrsion.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/include/plbase64.h
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/include/plerror.h
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/include/plgetopt.h
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/include/plstr.h
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/base64.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/plerror.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/plgetopt.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/plvrsion.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strcase.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strcat.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strchr.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strcmp.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strcpy.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strdup.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strlen.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strpbrk.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strstr.c
Examining data/mozjs78-78.4.0/nsprpub/lib/libc/src/strtok.c
Examining data/mozjs78-78.4.0/nsprpub/lib/prstreams/tests/testprstrm/testprstrm.cpp
Examining data/mozjs78-78.4.0/nsprpub/lib/prstreams/plvrsion.c
Examining data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp
Examining data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.h
Examining data/mozjs78-78.4.0/nsprpub/lib/tests/arena.c
Examining data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c
Examining data/mozjs78-78.4.0/nsprpub/lib/tests/getopt.c
Examining data/mozjs78-78.4.0/nsprpub/lib/tests/string.c
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_aix.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_bsdi.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_darwin.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_freebsd.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_hpux.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_linux.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_netbsd.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_nspr_pthread.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_nto.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_openbsd.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_os2.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_os2_errors.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_pcos.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_pth.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_qnx.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_riscos.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_scoos.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_solaris.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_unix_errors.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_unixos.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_unixware.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_win32_errors.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_win95.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/_winnt.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/md/prosdep.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/obsolete/pralarm.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/obsolete/probslet.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/obsolete/protypes.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/obsolete/prsem.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/private/pprio.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/private/pprmwait.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/private/pprthred.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/private/primpl.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/private/prpriv.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/gencfg.c
Examining data/mozjs78-78.4.0/nsprpub/pr/include/nspr.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/pratom.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prbit.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prclist.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prcmon.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prcountr.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prcvar.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prdtoa.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prenv.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prerr.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prerror.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prinet.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prinit.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prinrval.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prio.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/pripcsem.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prlink.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prlock.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prlog.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prlong.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prmem.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prmon.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prmwait.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prnetdb.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prolock.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prpdce.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prprf.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prproces.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prrng.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prrwlock.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prshm.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prshma.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prsystem.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prthread.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prtime.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prtpool.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prtrace.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prtypes.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prvrsion.h
Examining data/mozjs78-78.4.0/nsprpub/pr/include/prwin16.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/fileio.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/interval.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/ranfile.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/switch.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/thread.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/time.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/tpd.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcascii.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcbase.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcbase.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rccv.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rccv.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcfileio.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcfileio.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcinrval.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcinrval.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcio.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcio.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rclock.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rclock.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcmon.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcnetdb.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcnetdb.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcnetio.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcnetio.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcthread.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcthread.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rctime.cpp
Examining data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rctime.h
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prdir.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prfdcach.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prfile.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prio.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/priometh.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/pripv6.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prlayer.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prlog.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prmapopt.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prmmap.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prmwait.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prpolevt.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prprf.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prscanf.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prsocket.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/io/prstdio.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/malloc/prmalloc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/malloc/prmem.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2_errors.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2cv.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2gc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2inrval.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2poll.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2rng.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2sem.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2sock.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2thred.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/aix.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/aixwrap.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/bsdi.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/darwin.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/dgux.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/freebsd.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/hpux.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/linux.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/netbsd.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/nto.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/openbsd.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/pthreads_user.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/qnx.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/riscos.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/scoos.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/solaris.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix_errors.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unixware.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxpoll.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxproces.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxrng.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxshm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxwrap.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntdllmn.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntgc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntinrval.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntmisc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntsec.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntsem.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntthread.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w32ipcsem.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w32poll.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w32rng.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w32shm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95cv.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95dllmain.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95sock.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95thred.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/win32_errors.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/md/prosdep.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/memory/prseg.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/memory/prshm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/memory/prshma.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/dtoa.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/pralarm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/pratom.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/praton.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prcountr.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prdtoa.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prenv.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prerr.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prerror.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prerrortable.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prinit.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prinrval.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/pripc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/pripcsem.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prlog2.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prlong.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prolock.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prrng.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prsystem.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prthinfo.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prtime.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prtpool.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/misc/prtrace.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptio.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptmisc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptsynch.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptthread.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/combined/prucpu.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/combined/prucv.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/combined/prulock.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/combined/prustack.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/combined/pruthr.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/prcmon.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/prcthr.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/prdump.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/prmon.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/prrwlock.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/prsem.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/threads/prtpd.c
Examining data/mozjs78-78.4.0/nsprpub/pr/src/prvrsion.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/dll/mygetval.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/dll/mysetval.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/abstract.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/accept.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/acceptread.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/acceptreademu.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/addrstr.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/affinity.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/alarm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/anonfm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/append.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/atomic.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/attach.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/bigfile.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/bigfile2.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/bigfile3.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/bug1test.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/cleanup.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/cltsrv.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/concur.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/cvar.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/cvar2.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/dbmalloc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/dbmalloc1.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/dceemu.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/depend.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/dlltest.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/dtoa.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/env.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/errcodes.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/errset.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/exit.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/fdcach.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/fileio.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/foreign.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/forktest.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/formattm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/freeif.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/fsync.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/getai.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/gethost.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/getproto.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/i2l.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/initclk.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/inrval.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/instrumt.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/intrio.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/intrupt.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/io_timeout.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/io_timeoutk.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/io_timeoutu.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/ioconthr.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/ipv6.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/join.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/joinkk.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/joinku.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/joinuk.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/joinuu.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/layer.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/lazyinit.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/libfilename.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/lltest.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/lock.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/lockfile.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/logfile.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/logger.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/makedir.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/many_cv.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/mbcs.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/monref.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/multiacc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/multiwait.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/nameshm1.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/nbconn.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/nblayer.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/nonblock.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/ntioto.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/ntoh.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/obsints.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/op_2long.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/op_excl.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/op_filnf.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/op_filok.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/op_noacc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/op_nofil.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/openfile.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/parent.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/parsetm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/peek.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/perf.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/pipeping.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/pipeping2.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/pipepong.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/pipepong2.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/pipeself.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/poll_er.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/poll_nm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/poll_to.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/pollable.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/prfdbl.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/prftest.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/prftest1.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/prftest2.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/prfz.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/primblok.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/priotest.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/provider.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/prpoll.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/prpollml.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/prselect.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/prttools.h
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/pushtop.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/randseed.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/ranfile.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/reinit.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/rmdir.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/rwlockrank.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/rwlocktest.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sel_spd.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/selct_er.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/selct_nm.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/selct_to.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/select2.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/selintr.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sem.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sema.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/semaerr.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/semaerr1.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/semaping.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/semapong.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sendzlf.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/server_test.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/servr_kk.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/servr_ku.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/servr_uk.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/servr_uu.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/short_thread.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sigpipe.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sleep.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/socket.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sockopt.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sockping.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sockpong.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/stack.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/stat.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/stdio.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/str2addr.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/strod.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/suspend.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/switch.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/system.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/testbit.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/threads.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/thrpool_client.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/thrpool_server.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/thruput.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/time.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/timemac.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/timetest.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/tmoacc.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/tmocon.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/tpd.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/udpsrv.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/ut_ttools.h
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/vercheck.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/version.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/writev.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/xnotify.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/y2k.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/y2ktmo.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/yield.c
Examining data/mozjs78-78.4.0/nsprpub/pr/tests/zerolen.c
Examining data/mozjs78-78.4.0/nsprpub/tools/httpget.c
Examining data/mozjs78-78.4.0/nsprpub/tools/tail.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports-generated/dom1.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports-generated/foo.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports-generated/gfx.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports-generated/mozilla1.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports/dom1.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports/dom2.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports/foo.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports/gfx.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports/mozilla1.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports/mozilla2.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/exports/pprio.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/gn-processor/ipc/chromium/src/header.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/gn-processor/ipc/glue/header.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/gn-processor/trunk/webrtc/build/function.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/gn-processor/trunk/webrtc/build/no_op_function.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/gn-processor/trunk/webrtc/modules/include/header.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/linkage/prog/qux/qux1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/linkage/real/foo/foo1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/linkage/real/foo/foo2.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/linkage/shared/baz/baz1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/linkage/static/bar/bar_helper/bar_helper1.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/linkage/static/bar/bar1.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/linkage/static/bar/bar2.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/prog-lib-c-only/c-library/c-library.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/prog-lib-c-only/c-program/c_test_program.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/prog-lib-c-only/c-simple-programs/c_simple_program.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/prog-lib-c-only/cxx-library/c-source.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/prog-lib-c-only/cxx-library/cxx-library.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/prog-lib-c-only/cxx-program/cxx_test_program.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/prog-lib-c-only/cxx-simple-programs/cxx_simple_program.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/sources/bar.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/sources/bar.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/sources/foo.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/sources/foo.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/test-support-binaries-tracked/test/test-one.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/test-support-binaries-tracked/test/test-two.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/variable_passthru/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/variable_passthru/test1.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/variable_passthru/test2.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/variable_passthru/test2.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/visual-studio/dir1/bar.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/backend/data/visual-studio/dir1/foo.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/allow-compiler-warnings/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/asflags/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/compile-defines/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/compile-flags-field-validation/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/compile-flags-templates/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/compile-flags-type-validation/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/compile-flags/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/compile-includes/subdir/header.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/compile-includes/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/disable-compiler-warnings/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/disable-stl-wrapping/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports-generated/foo.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports-generated/mozilla1.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports-missing-generated/foo.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports-missing/foo.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports-missing/mozilla1.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/bar.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/baz.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/dom1.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/dom2.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/dom3.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/foo.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/gfx.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/mem.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/mem2.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/mozilla1.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/mozilla2.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/pprio.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/exports/pprthred.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/files-test-metadata/simple/base.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/generated-sources/a.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/generated-sources/b.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/generated-sources/c.cxx
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/generated-sources/d.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/host-compile-flags/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/host-sources/a.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/host-sources/b.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/host-sources/c.cxx
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/host-sources/d.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/link-flags/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/local_includes-filename/foo.h
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/program/test_program1.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/program/test_program2.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/resolved-flags-error/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/sources-just-c/d.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/sources/a.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/sources/b.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/sources/c.cxx
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/sources/d.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/test-linkables-cxx-link/one/foo.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/test-linkables-cxx-link/two/foo.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources-non-unified/bar.cxx
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources-non-unified/c1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources-non-unified/c2.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources-non-unified/foo.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources-non-unified/quux.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources/bar.cxx
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources/c1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources/c2.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources/foo.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/unified-sources/quux.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/variable-passthru/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/variable-passthru/test1.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/variable-passthru/test2.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/variable-passthru/test2.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/visibility-flags/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/wasm-compile-flags/test1.c
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/wasm-sources/a.cpp
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/wasm-sources/b.cc
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/wasm-sources/c.cxx
Examining data/mozjs78-78.4.0/python/mozbuild/mozbuild/test/frontend/data/wasm-sources/d.c
Examining data/mozjs78-78.4.0/third_party/python/MarkupSafe/src/markupsafe/_speedups.c
Examining data/mozjs78-78.4.0/third_party/python/coverage/coverage/ctracer/datastack.c
Examining data/mozjs78-78.4.0/third_party/python/coverage/coverage/ctracer/datastack.h
Examining data/mozjs78-78.4.0/third_party/python/coverage/coverage/ctracer/filedisp.c
Examining data/mozjs78-78.4.0/third_party/python/coverage/coverage/ctracer/filedisp.h
Examining data/mozjs78-78.4.0/third_party/python/coverage/coverage/ctracer/module.c
Examining data/mozjs78-78.4.0/third_party/python/coverage/coverage/ctracer/stats.h
Examining data/mozjs78-78.4.0/third_party/python/coverage/coverage/ctracer/tracer.c
Examining data/mozjs78-78.4.0/third_party/python/coverage/coverage/ctracer/tracer.h
Examining data/mozjs78-78.4.0/third_party/python/coverage/coverage/ctracer/util.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/common.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/common.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/ifaddrs.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/ifaddrs.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/net_connections.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/net_connections.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/net_kernel_structs.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/proc_socks.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/proc_socks.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/sys_socks.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/sys_socks.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/netbsd/socks.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/netbsd/socks.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/netbsd/specific.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/netbsd/specific.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/openbsd/specific.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/openbsd/specific.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/osx/process_info.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/osx/process_info.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/solaris/v10/ifaddrs.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/solaris/v10/ifaddrs.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/solaris/environ.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/solaris/environ.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/cpu.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/cpu.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/disk.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/disk.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/net.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/net.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/ntextapi.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_handles.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_handles.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_info.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_info.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_utils.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_utils.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/security.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/security.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/services.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/services.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/socks.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/socks.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/wmi.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/wmi.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_aix.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_bsd.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_common.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_common.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_linux.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_osx.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_posix.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_posix.h
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c
Examining data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_windows.c
Examining data/mozjs78-78.4.0/third_party/python/pyrsistent/pvectorcmodule.c
Examining data/mozjs78-78.4.0/third_party/python/pyyaml/ext/_yaml.c
Examining data/mozjs78-78.4.0/third_party/python/pyyaml/ext/_yaml.h
Examining data/mozjs78-78.4.0/third_party/python/scandir/_scandir.c
Examining data/mozjs78-78.4.0/third_party/python/scandir/osdefs.h
Examining data/mozjs78-78.4.0/third_party/python/scandir/winreparse.h
Examining data/mozjs78-78.4.0/third_party/rust/audio_thread_priority/atp_test.cpp
Examining data/mozjs78-78.4.0/third_party/rust/audio_thread_priority/audio_thread_priority.h
Examining data/mozjs78-78.4.0/third_party/rust/authenticator/src/linux/hidwrapper.h
Examining data/mozjs78-78.4.0/third_party/rust/authenticator/src/u2fhid-capi.h
Examining data/mozjs78-78.4.0/third_party/rust/cexpr/tests/input/chars.h
Examining data/mozjs78-78.4.0/third_party/rust/cexpr/tests/input/fail.h
Examining data/mozjs78-78.4.0/third_party/rust/cexpr/tests/input/floats.h
Examining data/mozjs78-78.4.0/third_party/rust/cexpr/tests/input/int_signed.h
Examining data/mozjs78-78.4.0/third_party/rust/cexpr/tests/input/int_unsigned.h
Examining data/mozjs78-78.4.0/third_party/rust/cexpr/tests/input/strings.h
Examining data/mozjs78-78.4.0/third_party/rust/cexpr/tests/input/test_llvm_bug_9069.h
Examining data/mozjs78-78.4.0/third_party/rust/chardetng_c/include/chardetng.h
Examining data/mozjs78-78.4.0/third_party/rust/clang-sys/tests/header.h
Examining data/mozjs78-78.4.0/third_party/rust/cose-c/include/cosec.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/cmake/sanitizers-cmake/tests/asan_test.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/cmake/sanitizers-cmake/tests/shortest.ext.test.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/codegear/gtest_all.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/codegear/gtest_link.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-death-test-internal.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-filepath.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-internal.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-linked_ptr.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-param-util-generated.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-param-util.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-port.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-string.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-tuple.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-type-util.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest-death-test.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest-message.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest-param-test.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest-printers.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest-spi.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest-test-part.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest-typed-test.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest_pred_impl.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest_prod.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/prime_tables.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample1.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample1.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample10_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample1_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample2.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample2.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample2_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample3-inl.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample3_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample4.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample4.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample4_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample5_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample6_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample7_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample8_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample9_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-all.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-death-test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-filepath.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-internal-inl.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-port.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-printers.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-test-part.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-typed-test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest_main.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-death-test_ex_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-death-test_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-filepath_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-linked_ptr_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-listener_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-message_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-options_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-param-test2_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-param-test_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-param-test_test.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-port_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-printers_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-test-part_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-tuple_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-typed-test2_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-typed-test_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-typed-test_test.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-unittest-api_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_all_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_break_on_failure_unittest_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_catch_exceptions_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_color_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_env_var_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_environment_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_filter_unittest_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_help_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_list_tests_unittest_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_main_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_no_test_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_output_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_pred_impl_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_prod_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_repeat_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_shuffle_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_sole_header_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_stress_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_throw_on_failure_ex_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_throw_on_failure_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_uninitialized_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_xml_outfile1_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_xml_outfile2_test_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_xml_output_unittest_.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/production.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/production.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/xcode/Samples/FrameworkSample/widget.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/xcode/Samples/FrameworkSample/widget.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/xcode/Samples/FrameworkSample/widget_test.cc
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/include/cubeb/cubeb.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/android/audiotrack_definitions.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/android/cubeb-output-latency.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/android/cubeb_media_library.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/android/sles_definitions.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/speex/arch.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/speex/fixed_generic.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/speex/resample.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/speex/resample_neon.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/speex/resample_sse.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/speex/speex_config_types.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/speex/speex_resampler.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/speex/stack_alloc.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb-internal.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb-jni-instances.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb-jni.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb-jni.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb-sles.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb-speex-resampler.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_alsa.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_array_queue.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_assert.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_audiotrack.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_audiounit.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_jack.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_kai.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_log.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_log.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_mixer.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_mixer.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_opensl.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_osx_run_loop.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_osx_run_loop.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_pulse.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_resampler.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_resampler.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_resampler_internal.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_ring_array.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_ringbuffer.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_sndio.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_strings.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_strings.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_sun.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_utils.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_utils.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_utils_unix.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_utils_win.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_wasapi.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_winmm.c
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/common.h
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_audio.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_callback_ret.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_deadlock.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_device_changed_callback.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_devices.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_duplex.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_latency.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_loopback.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_overload_callback.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_record.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_resampler.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_ring_array.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_ring_buffer.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_sanity.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_tone.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_utils.cpp
Examining data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/tools/cubeb-test.cpp
Examining data/mozjs78-78.4.0/third_party/rust/encoding_c/include/encoding_rs.h
Examining data/mozjs78-78.4.0/third_party/rust/encoding_c/include/encoding_rs_cpp.h
Examining data/mozjs78-78.4.0/third_party/rust/encoding_c/include/encoding_rs_statics.h
Examining data/mozjs78-78.4.0/third_party/rust/encoding_c_mem/include/encoding_rs_mem.h
Examining data/mozjs78-78.4.0/third_party/rust/encoding_c_mem/include/encoding_rs_mem_cpp.h
Examining data/mozjs78-78.4.0/third_party/rust/freetype/etc/bindings.h
Examining data/mozjs78-78.4.0/third_party/rust/gfx-backend-metal/shaders/macros.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/contrib/glslopt/Main.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/gl.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/KHR/khrplatform.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c11/threads.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c11/threads_posix.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c11/threads_win32.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c11_compat.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c99_alloca.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c99_compat.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c99_math.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/no_extern_c.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp-lex.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp-parse.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp-parse.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/pp.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/pp_standalone_scaffolding.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/pp_standalone_scaffolding.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_array_index.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_expr.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_function.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_type.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_functions.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_functions.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_int64.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_types.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_variables.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/generate_ir.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_lexer.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_optimizer.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_optimizer.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_parser.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_parser.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_parser_extras.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_parser_extras.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_symbol_table.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_symbol_table.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/hir_field_selection.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_array_refcount.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_array_refcount.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_basic_block.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_basic_block.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_builder.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_builder.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_builder_print_visitor.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_builder_print_visitor.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_clone.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_constant_expression.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_equals.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_flattening.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_flattening.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_operation.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_operation_constant.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_operation_strings.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_function.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_function_can_inline.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_function_detect_recursion.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_function_inlining.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_hierarchical_visitor.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_hierarchical_visitor.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_hv_accept.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_optimization.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_glsl_visitor.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_glsl_visitor.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_visitor.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_visitor.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_reader.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_reader.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_rvalue_visitor.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_rvalue_visitor.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_set_program_inouts.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_uniform.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_unused_structs.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_unused_structs.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_validate.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_variable_refcount.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_variable_refcount.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_visitor.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_atomics.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_functions.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_interface_blocks.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniform_block_active_visitor.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniform_block_active_visitor.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniform_blocks.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniform_initializers.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniforms.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_varyings.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_varyings.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/linker.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/linker.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/linker_util.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/linker_util.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/list.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/loop_analysis.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/loop_analysis.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/loop_unroll.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_blend_equation_advanced.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_buffer_access.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_buffer_access.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_const_arrays_to_uniforms.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_cs_derived.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_discard.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_discard_flow.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_distance.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_if_to_cond_assign.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_instructions.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_int64.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_jumps.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_mat_op_to_vec.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_named_interface_blocks.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_noise.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_offset_array.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_output_reads.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_packed_varyings.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_packing_builtins.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_shared_reference.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_subroutine.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_tess_level.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_texture_projection.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_ubo_reference.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_variable_index_to_cond_assign.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_vec_index_to_cond_assign.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_vec_index_to_swizzle.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_vector.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_vector_derefs.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_vector_insert.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_vertex_id.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/main.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_add_neg_to_sub.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_algebraic.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_array_splitting.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_conditional_discard.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_constant_folding.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_constant_propagation.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_constant_variable.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_copy_propagation_elements.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_dead_builtin_variables.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_dead_builtin_varyings.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_dead_code.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_dead_code_local.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_dead_functions.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_flatten_nested_if_blocks.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_flip_matrices.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_function_inlining.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_if_simplification.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_minmax.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_rebalance_tree.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_redundant_jumps.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_structure_splitting.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_swizzle.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_tree_grafting.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_vectorize.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/program.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/propagate_invariance.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/s_expression.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/s_expression.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/serialize.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/serialize.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/shader_cache.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/shader_cache.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/standalone.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/standalone.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/standalone_scaffolding.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/standalone_scaffolding.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/string_to_uint_map.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/string_to_uint_map.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/test_optpass.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/builtin_type_macros.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl_types.cpp
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl_types.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/shader_enums.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/shader_enums.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/shader_info.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/gallium/auxiliary/util/u_half.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/gallium/include/pipe/p_compiler.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/gallium/include/pipe/p_config.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/gallium/include/pipe/p_format.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mapi/glapi/glapi.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/compiler.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/config.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/context.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/context.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/dd.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/debug_output.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/draw.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/enums.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/errors.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/extensions.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/extensions_table.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/extensions_table.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/formats.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/glheader.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/hash.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/imports.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/imports.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/macros.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/menums.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/mtypes.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/shaderobj.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/uniforms.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/version.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/math/m_matrix.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/program/dummy_errors.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/program/ir_to_mesa.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/program/prog_instruction.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/program/prog_parameter.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/program/prog_statevars.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/program/program.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/program/symbol_table.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/program/symbol_table.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/vbo/vbo.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/sha1/sha1.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/sha1/sha1.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/bitscan.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/bitset.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/blob.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/blob.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/crc32.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/crc32.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/debug.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/debug.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/detect_os.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/fast_urem_by_const.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/fnv1a.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/futex.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/half_float.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/half_float.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/hash_table.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/hash_table.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/list.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/macros.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/mesa-sha1.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/mesa-sha1.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/mesa-sha1_test.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/rounding.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/set.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/set.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/simple_mtx.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/softfloat.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/softfloat.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/string_buffer.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/string_buffer.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/strndup.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/strtod.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/strtod.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_atomic.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_dynarray.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_endian.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_math.c
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_math.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_string.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/xxhash.h
Examining data/mozjs78-78.4.0/third_party/rust/glslopt/wrapper.hpp
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/AsyncFunctionResolveKind.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/BytecodeFormatFlags.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/CheckIsObjectKind.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/FunctionFlags.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/FunctionPrefixKind.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/GeneratorAndAsyncKind.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/GeneratorResumeKind.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/Opcodes.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/SourceNotes.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/StencilEnums.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/Symbol.h
Examining data/mozjs78-78.4.0/third_party/rust/jsparagus-stencil/src/copy/ThrowMsgKind.h
Examining data/mozjs78-78.4.0/third_party/rust/libloading/src/os/unix/global_static.c
Examining data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c
Examining data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.h
Examining data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3ext.h
Examining data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/wrapper.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/blast/blast.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/blast/blast.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/infback9/infback9.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/infback9/infback9.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/infback9/inffix9.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/infback9/inflate9.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/infback9/inftree9.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/infback9/inftree9.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/inflate86/inffas86.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream/test.cpp
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream/zfstream.cpp
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream/zfstream.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream2/zstream.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream2/zstream_test.cpp
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/test.cc
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/masmx64/inffas8664.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/crypt.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/ioapi.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/ioapi.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/iowin32.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/iowin32.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/miniunz.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/minizip.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/mztools.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/mztools.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/unzip.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/unzip.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/zip.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/zip.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/puff/puff.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/puff/puff.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/puff/pufftest.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/testzlib/testzlib.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/enough.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/fitblk.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gun.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzappend.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzjoin.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zpipe.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/example.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/infcover.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/adler32.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/compress.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/crc32.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/crc32.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/deflate.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/deflate.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzclose.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzguts.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzlib.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzread.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzwrite.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/infback.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/inffast.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/inffast.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/inffixed.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/inflate.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/inflate.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/inftrees.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/inftrees.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/trees.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/trees.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/uncompr.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/zconf.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/zlib.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/zutil.c
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/zutil.h
Examining data/mozjs78-78.4.0/third_party/rust/libz-sys/src/smoke.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/lmdb.h
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb_copy.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb_dump.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb_load.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb_stat.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/midl.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/midl.h
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest2.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest3.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest4.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest5.c
Examining data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest6.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-runtime-internals/src/context/tests/c_child.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-runtime-internals/src/instance/siginfo_ext.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-runtime/include/lucet.h
Examining data/mozjs78-78.4.0/third_party/rust/lucet-runtime/include/lucet_types.h
Examining data/mozjs78-78.4.0/third_party/rust/lucet-runtime/include/lucet_val.h
Examining data/mozjs78-78.4.0/third_party/rust/lucet-runtime/include/lucet_vmctx.h
Examining data/mozjs78-78.4.0/third_party/rust/lucet-runtime/tests/guests/null.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-runtime/tests/guests/yield_resume.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-runtime/tests/c_api.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/examples/hello.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/examples/pseudoquine.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/include/lucet_wasi.h
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/cant_dotdot.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/clock_getres.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/exitcode.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/follow_symlink.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/fs.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/getentropy.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/getrusage.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/gettimeofday.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/notdir.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/poll.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/preopen_populates.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/read_file.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/read_file_twice.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/stat.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/stdin.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/symlink_escape.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/symlink_loop.c
Examining data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/write_file.c
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/mozpkix.hpp
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nspr_err.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nspr_error.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nspr_io.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nspr_time.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nss_ciphers.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nss_init.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nss_p11.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nss_secerr.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nss_ssl.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nss_sslerr.h
Examining data/mozjs78-78.4.0/third_party/rust/neqo-crypto/bindings/nss_sslopt.h
Examining data/mozjs78-78.4.0/third_party/rust/nix/src/errno_dragonfly.c
Examining data/mozjs78-78.4.0/third_party/rust/nix/test/test_kmod/hello_mod/hello.c
Examining data/mozjs78-78.4.0/third_party/rust/raw-cpuid/src/cpuid.c
Examining data/mozjs78-78.4.0/third_party/rust/rlbox_lucet_sandbox/c_src/lucet_sandbox_wrapper.c
Examining data/mozjs78-78.4.0/third_party/rust/rlbox_lucet_sandbox/include/lucet_sandbox.h
Examining data/mozjs78-78.4.0/third_party/rust/rlbox_lucet_sandbox/include/rlbox_lucet_sandbox.hpp
Examining data/mozjs78-78.4.0/third_party/rust/rlbox_lucet_sandbox/test/test_lucet_sandbox_glue.cpp
Examining data/mozjs78-78.4.0/third_party/rust/rlbox_lucet_sandbox/test/test_lucet_sandbox_glue_embedder_vars.cpp
Examining data/mozjs78-78.4.0/third_party/rust/rlbox_lucet_sandbox/test/test_lucet_sandbox_glue_main.cpp
Examining data/mozjs78-78.4.0/third_party/rust/rlbox_lucet_sandbox/test/test_lucet_sandbox_glue_preload.cpp
Examining data/mozjs78-78.4.0/third_party/rust/shift_or_euc_c/include/shift_or_euc.h
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/include/spirv_cross/barrier.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/include/spirv_cross/external_interface.h
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/include/spirv_cross/image.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/include/spirv_cross/internal_interface.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/include/spirv_cross/sampler.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/include/spirv_cross/thread_group.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/GLSL.std.450.h
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/main.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv.h
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cfg.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cfg.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_common.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cpp.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cpp.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_c.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_c.h
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_containers.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_error_handling.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_parsed_ir.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_parsed_ir.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_util.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_util.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_glsl.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_glsl.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_hlsl.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_hlsl.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_msl.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_msl.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_parser.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_parser.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_reflect.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_reflect.hpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/wrapper.cpp
Examining data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/wrapper.hpp
Examining data/mozjs78-78.4.0/third_party/rust/walkdir/compare/nftw.c
Examining data/mozjs78-78.4.0/third_party/rust/yaml-rust/tests/specs/handler_spec_test.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/interface/harness/FuzzerRunner.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/interface/harness/FuzzerRunner.h
Examining data/mozjs78-78.4.0/tools/fuzzing/interface/harness/FuzzerTestHarness.h
Examining data/mozjs78-78.4.0/tools/fuzzing/interface/FuzzingInterface.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/interface/FuzzingInterface.h
Examining data/mozjs78-78.4.0/tools/fuzzing/interface/FuzzingInterfaceStream.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/interface/FuzzingInterfaceStream.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerBuiltins.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerBuiltinsMsvc.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerCommand.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerCorpus.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerCrossOver.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerDataFlowTrace.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerDataFlowTrace.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerDefs.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerDictionary.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerDriver.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerExtFunctions.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerExtFunctionsDlsym.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerExtFunctionsWeak.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerExtFunctionsWindows.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerExtraCounters.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerFork.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerFork.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIO.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIO.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIOPosix.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIOWindows.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerInterface.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerInternal.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerLoop.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerMain.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerMerge.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerMerge.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerMutate.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerMutate.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerOptions.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerRandom.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerSHA1.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerSHA1.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerTracePC.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerTracePC.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtil.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtil.h
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtilDarwin.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtilFuchsia.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtilLinux.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtilPosix.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtilWindows.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerValueBitMap.h
Examining data/mozjs78-78.4.0/tools/fuzzing/registry/FuzzerRegistry.cpp
Examining data/mozjs78-78.4.0/tools/fuzzing/registry/FuzzerRegistry.h

FINAL RESULTS:

data/mozjs78-78.4.0/config/nsinstall.c:163:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  if (chmod(toname, mode) < 0)
data/mozjs78-78.4.0/config/nsinstall.c:174:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  if (chmod(toname, (mode & (S_IREAD | S_IWRITE))) < 0)
data/mozjs78-78.4.0/config/nsinstall.c:341:31:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
      if ((owner || group) && chown(toname, uid, gid) < 0)
data/mozjs78-78.4.0/config/nsinstall.c:377:38:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
          (!S_ISLNK(tosb.st_mode) || readlink(toname, buf, sizeof buf) != len ||
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1113:32:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
        int32_t ret = (int32_t)readlink(TZDEFAULT, gTimeZoneBuffer, sizeof(gTimeZoneBuffer)-1);
data/mozjs78-78.4.0/js/src/vm/DateTime.cpp:656:20:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    ssize_t slen = readlink(linkName, linkTarget, linkTargetLen);
data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-linux.cc:748:24:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
  ssize_t exeNameLen = readlink("/proc/self/exe", exeName, sizeof(exeName) - 1);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:242:37:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
            if ((owner || group) && chown(toname, uid, gid) < 0) {
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:277:18:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
                 readlink(toname, buf, sizeof buf) != len ||
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:338:17:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
            if (chmod(toname, mode) < 0)
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/netbsd/specific.c:141:19:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    ssize_t len = readlink(buf, path, sizeof(path) - 1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:33812:42:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
  { "readlink",     (sqlite3_syscall_ptr)readlink,        0 },
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:32:13:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
#    define chmod(path,mode)    _chmod(path,mode)
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:277:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
      chmod(item->fname,item->mode);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gun.c:527:11:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    (void)chmod(to, was.st_mode & 07777);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gun.c:530:11:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    (void)chown(to, was.st_uid, was.st_gid);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4821:4:  [5] (misc) SetSecurityDescriptorDacl:
  Never create NULL ACLs; an attacker can set it to Everyone (Deny All
  Access), which would even forbid administrator access (CWE-732).
			SetSecurityDescriptorDacl(&mdb_null_sd, TRUE, 0, FALSE);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4821:4:  [5] (misc) SetSecurityDescriptorDacl:
  Never create NULL ACLs; an attacker can set it to Everyone (Deny All
  Access), which would even forbid administrator access (CWE-732).
			SetSecurityDescriptorDacl(&mdb_null_sd, TRUE, 0, FALSE);
data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/StringOperations.h:17:16:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  size_t Len = snprintf(nullptr, 0, Format.c_str(), ArgList...);
data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/StringOperations.h:19:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  snprintf(Buf.get(), Len + 1, Format.c_str(), ArgList...);
data/mozjs78-78.4.0/build/macosx/permissions/chown_revert.c:16:10:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  return execl("/usr/sbin/chown", "/usr/sbin/chown", "-R", "-h", uidstring,
data/mozjs78-78.4.0/build/macosx/permissions/chown_root.c:10:10:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  return execl("/usr/sbin/chown", "/usr/sbin/chown", "-R", "-h", "root:admin",
data/mozjs78-78.4.0/build/unix/stdc++compat/stdc++compat.cpp:68:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf(buf, sizeof(buf), fmt, ap);
data/mozjs78-78.4.0/config/nsinstall.c:195:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(destdir, "%s%s%s", to, _DIRECTORY_SEPARATOR, base);
data/mozjs78-78.4.0/config/nsinstall.c:214:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(direntry, "%s/%s", from, ep->d_name);
data/mozjs78-78.4.0/config/nsinstall.c:215:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(destentry, "%s%s%s", destdir, _DIRECTORY_SEPARATOR, ep->d_name);
data/mozjs78-78.4.0/config/nsinstall.c:330:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(toname, "%s%s%s", todir, _DIRECTORY_SEPARATOR, base);
data/mozjs78-78.4.0/config/nsinstall.c:344:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access(name, R_OK) != 0) {
data/mozjs78-78.4.0/config/nsinstall.c:355:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(linkname, "%s/%s", linkprefix, name);
data/mozjs78-78.4.0/config/nsinstall.c:363:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(linkname + lplen, name);
data/mozjs78-78.4.0/config/pathsub.c:43:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, ap);
data/mozjs78-78.4.0/config/pathsub.c:108:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
char* xstrdup(char* s) { return strcpy(xmalloc(strlen(s) + 1), s); }
data/mozjs78-78.4.0/config/pathsub.c:133:18:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    len = strlen(strcpy(outpath, to));
data/mozjs78-78.4.0/config/pathsub.c:145:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(outpath + len, "%s/", buf);
data/mozjs78-78.4.0/config/pathsub.c:157:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  cp = strcpy(outpath + PATH_MAX - (len + 1), name);
data/mozjs78-78.4.0/config/pathsub.c:166:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(cp, name);
data/mozjs78-78.4.0/config/pathsub.c:176:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(outpath, cp);
data/mozjs78-78.4.0/intl/icu/source/common/cstring.h:36:57:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define uprv_strcpy(dst, src) U_STANDARD_CPP_NAMESPACE  strcpy(dst, src)
data/mozjs78-78.4.0/intl/icu/source/common/cstring.h:39:56:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
#define uprv_strcat(dst, src) U_STANDARD_CPP_NAMESPACE strcat(dst, src)
data/mozjs78-78.4.0/intl/icu/source/common/cwchar.h:41:24:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
#   define uprv_wcscpy wcscpy
data/mozjs78-78.4.0/intl/icu/source/common/cwchar.h:42:24:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
#   define uprv_wcscat wcscat
data/mozjs78-78.4.0/intl/icu/source/common/icuplug.cpp:44:62:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DBG(x) fprintf(stderr, "%s:%d: ",__FILE__,__LINE__); fprintf x
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:2073:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(codepage,UCNV_SWAP_LFNL_OPTION_STRING);
data/mozjs78-78.4.0/intl/icu/source/common/rbbirb.h:223:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define RBBIDebugPrintf printf
data/mozjs78-78.4.0/intl/icu/source/common/udata.cpp:1456:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
U_CAPI void U_EXPORT2 udata_setFileAccess(UDataFileAccess access, UErrorCode * /*status*/)
data/mozjs78-78.4.0/intl/icu/source/common/udata.cpp:1459:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    gDataFileAccess = access;
data/mozjs78-78.4.0/intl/icu/source/common/unicode/udata.h:414:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
udata_setFileAccess(UDataFileAccess access, UErrorCode *status);
data/mozjs78-78.4.0/intl/icu/source/common/unicode/utext.h:1242:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    UTextAccess *access;
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:42:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return ut->pFuncs->access(ut, index, forward);
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:117:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        ut->pFuncs->access(ut, index, TRUE);
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:130:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                ut->pFuncs->access(ut, ut->chunkNativeStart, FALSE);
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:192:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (ut->pFuncs->access(ut, ut->chunkNativeLimit, TRUE) == FALSE) {
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:222:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (ut->pFuncs->access(ut, nativePosition, TRUE)) {
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:225:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        UBool r = ut->pFuncs->access(ut, nativePosition, FALSE);  // reverse iteration flag loads preceding chunk
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:273:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (ut->pFuncs->access(ut, ut->chunkNativeLimit, TRUE) == FALSE) {
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:287:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (ut->pFuncs->access(ut, ut->chunkNativeLimit, TRUE) == FALSE) {
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:313:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (ut->pFuncs->access(ut, ut->chunkNativeStart, FALSE) == FALSE) {
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:327:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (ut->pFuncs->access(ut, ut->chunkNativeStart, FALSE) == FALSE) {
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:354:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if(!ut->pFuncs->access(ut, index, TRUE)) {
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:394:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if(!ut->pFuncs->access(ut, index, FALSE)) {
data/mozjs78-78.4.0/intl/icu/source/common/utext.cpp:403:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (ut->chunkOffset==0 && !ut->pFuncs->access(ut, index, FALSE)) {
data/mozjs78-78.4.0/intl/icu/source/i18n/astro.cpp:40:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, pat, ap);
data/mozjs78-78.4.0/intl/icu/source/i18n/chnsecal.cpp:43:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, pat, ap);
data/mozjs78-78.4.0/intl/icu/source/i18n/decNumber.cpp:7937:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
     else printf(spec, ar[i]);
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvfmt.cpp:106:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(mesg, "skeleton: %s; pattern: %s\n", result, result_1);
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvfmt.cpp:725:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(mesg, "in getBestSkeleton: fSkeleton: %s; \n", result);
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvfmt.cpp:771:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(mesg, "in getBestSkeleton: fSkeleton: %s; \n", result);
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvinf.cpp:565:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(mesg, "in getBestSkeleton: skeleton: %s; \n", result);
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvinf.cpp:631:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(mesg, "available skeletons: skeleton: %s; \n", result);
data/mozjs78-78.4.0/intl/icu/source/i18n/islamcal.cpp:45:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, pat, ap);
data/mozjs78-78.4.0/intl/icu/source/i18n/olsontz.cpp:45:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, pat, ap);
data/mozjs78-78.4.0/intl/icu/source/i18n/regeximp.h:46:36:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define REGEX_SCAN_DEBUG_PRINTF(a) printf a
data/mozjs78-78.4.0/intl/icu/source/i18n/timezone.cpp:60:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, pat, ap);
data/mozjs78-78.4.0/intl/icu/source/i18n/ulocdata.cpp:229:16:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        return system;
data/mozjs78-78.4.0/intl/icu/source/i18n/ulocdata.cpp:237:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    return system;
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:354:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(pathToFunction, nodeList[i]->name);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:355:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(pathToFunction, separatorString);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:357:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(pathToFunction, nodeList[i]->name); /* including 'root' */
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:389:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(gTestName, pathToFunction);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:413:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(ERROR_LOG[ERRONEOUS_FUNCTION_COUNT++], pathToFunction);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:687:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stdout, pattern, ap);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:707:5:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    vsprintf(buf, pattern, ap);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:729:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stdout, pattern, ap);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:748:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stdout, pattern, ap);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:761:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stdout, pattern, ap);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:778:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stdout, pattern, ap);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:1282:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(XML_PREFIX,rootName);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/tstdtmod.cpp:44:9:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
        vsprintf(buffer, fmt, ap);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/tstdtmod.cpp:71:9:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
        vsprintf(buffer, fmt, ap);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/tstdtmod.cpp:96:9:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
        vsprintf(buffer, fmt, ap);
data/mozjs78-78.4.0/intl/icu/source/tools/genbrk/genbrk.cpp:182:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(msg, "genbrk writes dummy %s because of UCONFIG_NO_BREAK_ITERATION and/or UCONFIG_NO_FILE_IO, see uconfig.h", outFileName);
data/mozjs78-78.4.0/intl/icu/source/tools/genccode/genccode.c:174:17:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                fprintf(stdout, message, filename);
data/mozjs78-78.4.0/intl/icu/source/tools/gencfu/gencfu.cpp:196:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(msg, "gencfu writes dummy %s because of UCONFIG_NO_REGULAR_EXPRESSIONS and/or UCONFIG_NO_NORMALIZATION and/or UCONFIG_NO_FILE_IO, see uconfig.h", outFileName);
data/mozjs78-78.4.0/intl/icu/source/tools/gendict/gendict.cpp:304:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(msg, "gendict writes dummy %s because of UCONFIG_NO_BREAK_ITERATION and/or UCONFIG_NO_FILE_IO, see uconfig.h", outFileName);
data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.cpp:831:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line, "static const UVersionInfo %s_formatVersion={", name);
data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.cpp:833:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line, "static const UVersionInfo %s_dataVersion={", name);
data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.cpp:835:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line, "static const int32_t %s_indexes[Normalizer2Impl::IX_COUNT]={\n", name);
data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.cpp:840:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line, "static const uint16_t %s_extraData[%%ld]={\n", name);
data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.cpp:842:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line, "static const uint8_t %s_smallFCD[%%ld]={\n", name);
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/errmsg.c:31:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, msg, va);
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/errmsg.c:69:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(stderr, msg, va);
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtjava.cpp:473:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(byteBuffer, byteDecl, byteArray[byteIterator]);
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtjava.cpp:477:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(byteBuffer, byteDecl, (byteArray[byteIterator]-256));
data/mozjs78-78.4.0/intl/icu/source/tools/icupkg/icupkg.cpp:529:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(outFilenameBuffer, inFilename);
data/mozjs78-78.4.0/intl/icu/source/tools/icuswap/icuswap.cpp:82:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf((FILE *)context, fmt, args);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:537:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "bash -c \"%s\"", command);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:540:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "QSH CMD('%s')", command);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:553:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    int result = system(cmd);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:692:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(checkLibFile, "%s%s", targetDir, libFileNames[LIB_FILE_VERSION]);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:929:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(libFileNames[LIB_FILE], "%s", libName);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:931:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(libFileNames[LIB_FILE], "%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:937:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(libFileNames[LIB_FILE], "%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:948:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(libFileNames[LIB_FILE_MINGW], "lib%s.dll.a", libName);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:950:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(libFileNames[LIB_FILE_CYGWIN], "cyg%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:954:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(libFileNames[LIB_FILE_CYGWIN_VERSION], "cyg%s%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:963:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(libFileNames[LIB_FILE_VERSION_TMP], "%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:968:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(libFileNames[LIB_FILE_VERSION_TMP], "%s%s%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:975:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(libFileNames[LIB_FILE_OS390BATCH_VERSION], "%s%s.x",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:978:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(libFileNames[LIB_FILE_OS390BATCH_MAJOR], "%s%s.x",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:983:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(libFileNames[LIB_FILE_VERSION_TMP], "%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:988:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(libFileNames[LIB_FILE_VERSION_TMP], "%s%s%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:997:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(libFileNames[LIB_FILE_VERSION_MAJOR], "%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1002:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(libFileNames[LIB_FILE_VERSION], "%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1007:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(libFileNames[LIB_FILE_VERSION_MAJOR], "%s%s%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1014:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(libFileNames[LIB_FILE_VERSION], "%s%s%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1032:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(libFileNames[LIB_FILE_VERSION], "%s.%s", libFileNames[LIB_FILE], pkgDataFlags[A_EXT]);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1055:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd, "cd %s && %s %s && %s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1071:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(name1, "%s", libFileNames[LIB_FILE_CYGWIN]);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1072:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(name2, "%s", libFileNames[LIB_FILE_CYGWIN_VERSION]);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1076:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s/%s", targetDir, libFileNames[LIB_FILE_OS390BATCH_VERSION]);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1078:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(cmd, "cd %s && %s %s && %s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1091:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(cmd, "cd %s && %s %s.x && %s %s %s.x",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1106:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(name1, "%s%s%s", libFileNames[LIB_FILE], FILE_EXTENSION_SEP, pkgDataFlags[SO_EXT]);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1107:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(name2, "%s", libFileNames[LIB_FILE_VERSION]);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1115:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(name1, "%s%s%s", libFileNames[LIB_FILE], FILE_EXTENSION_SEP, pkgDataFlags[SO_EXT]);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1116:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(name2, "%s", libFileNames[LIB_FILE_VERSION]);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1119:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd, "cd %s && %s %s && %s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1154:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd, "cd %s && %s %s.lib %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1167:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd, "cd %s && %s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1182:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1217:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd, "%s %s %s", pkgDataFlags[INSTALL_CMD], fileName, installDir);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1219:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd, "%s %s %s %s", WIN_INSTALL_CMD, fileName, installDir, WIN_INSTALL_CMD_FLAGS);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1290:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd, "%s %s %s %s", WIN_INSTALL_CMD, srcDir, installDir, WIN_INSTALL_CMD_FLAGS);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1311:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(libFileNames[LIB_FILE_VERSION], "%s%s%s.%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1317:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s %s %s%s %s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1331:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s %s%s", 
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1343:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s %s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1392:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s %s %s%s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1401:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(cmd, "%s %s%s", 
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1427:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s%s%s %s -o %s%s %s %s%s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1435:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s%s%s %s -o %s%s %s %s%s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1443:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s %s%s;%s %s -o %s%s %s %s%s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1452:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s %s -o %s%s %s %s%s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1476:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(PDS_Name, "%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1479:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(PDS_Name, getenv("ICU_PDS_NAME_SUFFIX"));
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1481:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(PDS_Name, "%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1485:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(PDS_Name, "%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1491:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(PDS_Name, "%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1494:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(PDS_Name, getenv("ICU_PDS_NAME_SUFFIX"));
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1496:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(PDS_Name, "%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1500:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(PDS_Name, "%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1507:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(PDS_LibName,"%s%s%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1513:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(cmd, "%s %s -o %s %s %s%s %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1557:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd.getAlias(), "%s %s -o %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1617:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(icudtAll, "%s%s%sall.c",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1661:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(cmd, "%s %s -o %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1672:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(buffer, "%s",tempObjectFile);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1685:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(dataDirName, "%s%s", DATA_PREFIX[n], PKGDATA_FILE_SEP_STRING);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1734:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(cmd, "#include \"%s\"\n", gencmnFile);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1744:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s %s -o %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1771:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd, "%s %s -I. -o %s %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1822:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(staticLibFilePath, "%s%s%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1829:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(staticLibFilePath, "%s%s%s%s%s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1837:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s\"%s\" \"%s\"",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1877:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(resFilePath, "\"%s\"", tmpResFilePath);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1907:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s\"%s\" %s %s\"%s\" \"%s\" %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:2019:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(tmpbuffer, "%s%s ", o->entryName, UDATA_CMN_INTERMEDIATE_SUFFIX);
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:2190:21:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    p.adoptInstead( popen(cmdBuf.data(), "r") );
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:2264:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "%s %s -o %s",
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:2270:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(optMatchArch, "%s", obj);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:65:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf((FILE *)context, fmt, args);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:261:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(filename, path);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:277:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(s, name);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:440:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pkgPrefix, p);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:1047:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(items[idx].name, name);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:338:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    count = snprintf(
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:364:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    count = snprintf(
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:414:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(entry, optName);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_gencmn.cpp:341:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer,
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_gencmn.cpp:353:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer, "extern const char\n    %s%s[]", symPrefix?symPrefix:"", files[0].pathname);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_gencmn.cpp:356:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(buffer, ",\n    %s%s[]", symPrefix?symPrefix:"", files[i].pathname);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_gencmn.cpp:361:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_gencmn.cpp:393:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer, "        { \"%s\", %s%s }", files[0].basename, symPrefix?symPrefix:"", files[0].pathname);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_gencmn.cpp:396:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(buffer, ",\n        { \"%s\", %s%s }", files[i].basename, symPrefix?symPrefix:"", files[i].pathname);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkgitems.cpp:52:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf((FILE *)context, fmt, args);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/udbgutil.cpp:607:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( buf, CLDR_TRAC_URL );
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/udbgutil.cpp:608:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( buf, ticket+strlen(CLDR_TICKET_PREFIX) );
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/udbgutil.cpp:610:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( buf, ICU_TRAC_URL );
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/udbgutil.cpp:611:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( buf, ticket );
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:61:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf(f, header, filename, buffer);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:63:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf(f, header, filename, generator);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:91:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer,
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:150:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(f, prefix, (long)length);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:175:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(f, value<=9 ? "%lu" : "0x%lx", (unsigned long)value);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:299:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line, "static const uint16_t %s_trieIndex[%%ld]={\n", name);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:300:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line2, "static const uint%d_t %s_trieData[%%ld]={\n", (int)width, name);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:302:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line, "static const UCPTrie %s_trie={\n", name);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:303:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line2, "%s_trieIndex", name);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:304:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line3, "%s_trieData", name);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:317:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(f, prefix, (long)length);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:338:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(f, c<0x20 ? "%u" : "'%c'", c);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/asctime.c:106:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	(void) sprintf(result,
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/asctime.c:113:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		return strcpy(buf, result);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/ialloc.c:24:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			(void) strcpy(result + oldsize, new);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:371:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			(void) strcpy(fullname, p);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:373:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			(void) strcat(fullname, name);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:381:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (doaccess && access(name, R_OK) != 0)
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:1217:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		(void) strcpy(lcl_TZname, name);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:1238:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		(void) strcpy(lclptr->chars, gmt);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/scheck.c:60:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	if (sscanf(string, fbuf, &dummy) != 1)
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:270:11:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			(void) fprintf(stderr, tformat(), *tp);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:280:11:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			(void) fprintf(stderr, tformat(), t);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:544:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		(void) strcpy(&fakeenv[0][3], argv[i]);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:561:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(path, dirarg);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:564:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(path, argv[i]);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:808:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			(void) printf(tformat(), t);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:1047:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(path, basedir);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:1050:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(path, relpath);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:1062:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(pzonename, relpath);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:1084:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(subpath, relpath);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:1086:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(subpath, dir->d_name);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:1088:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(subpath, dir->d_name);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:482:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
static void ATTRIBUTE_FORMAT((printf, 1, 0))
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:491:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, string, args);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:499:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
static void ATTRIBUTE_FORMAT((printf, 1, 2))
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:508:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
static void ATTRIBUTE_FORMAT((printf, 1, 2))
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:791:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    && access(fromname, F_OK) == 0 && !itsdir(fromname)) {
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:877:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	accres = access(myname, F_OK);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1089:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	if (sscanf(string, scheck(string, "%"SCNdZIC), &hh) == 1)
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1091:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	else if (sscanf(string, scheck(string, "%"SCNdZIC":%d"), &hh, &mm) == 2)
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1093:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	else if (sscanf(string, scheck(string, "%"SCNdZIC":%d:%d"),
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1281:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	if (sscanf(cp, scheck(cp, "%"SCNdZIC), &year) != 1) {
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1316:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	if (sscanf(cp, scheck(cp, "%d"), &day) != 1 ||
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1456:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	} else if (sscanf(cp, scheck(cp, "%"SCNdZIC), &rp->r_loyear) != 1) {
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1478:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	} else if (sscanf(cp, scheck(cp, "%"SCNdZIC), &rp->r_hiyear) != 1) {
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1531:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		if (sscanf(ep, scheck(ep, "%d"), &rp->r_dayofmonth) != 1 ||
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1688:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void) sprintf(fullname, "%s/%s", directory, name);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1849:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				(void) strcpy(&thischars[(int) thischarcnt],
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1956:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			(void) strcpy(abbr, format);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1957:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		else	(void) sprintf(abbr, format, letters);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1959:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		(void) strcpy(abbr, slashp + 1);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2602:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					(void) strcpy(startbuf, zp->z_format);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2692:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			(void) strcpy(chars, &chars[abbrinds[type]]);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2837:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void) sprintf(buf, "%s %d %s", yitcommand, year, type);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2838:11:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	result = system(buf);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:3103:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(&chars[charcnt], string);
data/mozjs78-78.4.0/js/src/builtin/Profilers.cpp:533:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execvp("perf", const_cast<char**>(args.begin()));
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/closures.c:346:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	  || access (mnt.mnt_dir, W_OK))
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/pa/ffi.c:52:57:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define debug(lvl, x...) do { if (lvl <= DEBUG_LEVEL) { printf(x); } } while (0)
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_double_va.c:20:20:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	*(ffi_arg*)resp = printf(format, doubleValue);
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_double_va.c:47:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	ffi_call(&cif, FFI_FN(printf), &res, args);
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_longdouble_va.c:20:20:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	*(ffi_arg*)resp = printf(format, ldValue);
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_longdouble_va.c:47:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	ffi_call(&cif, FFI_FN(printf), &res, args);
data/mozjs78-78.4.0/js/src/devtools/vprof/vprof.cpp:37:40:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
#  define sprintf_s(b, size, fmt, ...) sprintf((b), (fmt), __VA_ARGS__)
data/mozjs78-78.4.0/js/src/devtools/vprof/vprof.cpp:82:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf(buf, sizeof(buf), format, args);
data/mozjs78-78.4.0/js/src/devtools/vprof/vprof.cpp:86:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(buf);
data/mozjs78-78.4.0/js/src/devtools/vprof/vprof.cpp:90:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define vprof_printf printf
data/mozjs78-78.4.0/js/src/editline/editline.h:88:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
extern char	*strcat();
data/mozjs78-78.4.0/js/src/editline/editline.h:91:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
extern char	*strcpy();
data/mozjs78-78.4.0/js/src/editline/sysunix.c:146:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	(void)strcat(p, S_ISDIR(Sb.st_mode) ? "/" : " ");
data/mozjs78-78.4.0/js/src/gc/Nursery.cpp:872:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, " %6" PRIi64, static_cast<int64_t>(time.ToMicroseconds()));
data/mozjs78-78.4.0/js/src/gc/RootMarking.cpp:331:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                          const AutoAccessAtomsZone& access) {
data/mozjs78-78.4.0/js/src/gc/RootMarking.cpp:334:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  TraceAtoms(trc, access);
data/mozjs78-78.4.0/js/src/gc/RootMarking.cpp:336:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  jit::JitRuntime::Trace(trc, access);
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:275:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(cursor, fragments[i].get());
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:280:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(cursor, separator);
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:612:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(gcDebugFile, fmt, args);
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:1616:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, " %6" PRIi64, static_cast<int64_t>(time.ToMilliseconds()));
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:1638:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, " %6" PRIi64,
data/mozjs78-78.4.0/js/src/jit/CacheIRCompiler.cpp:5257:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  masm.printf(str);
data/mozjs78-78.4.0/js/src/jit/Ion.cpp:396:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void JitRuntime::Trace(JSTracer* trc, const AutoAccessAtomsZone& access) {
data/mozjs78-78.4.0/js/src/jit/Ion.cpp:405:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Zone* zone = trc->runtime()->atomsZone(access);
data/mozjs78-78.4.0/js/src/jit/IonScript.h:486:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(ncode, code);
data/mozjs78-78.4.0/js/src/jit/JitRealm.h:303:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  static void Trace(JSTracer* trc, const js::AutoAccessAtomsZone& access);
data/mozjs78-78.4.0/js/src/jit/JitSpewer.cpp:165:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = snprintf(jsonBuffer, bufferLength,
data/mozjs78-78.4.0/js/src/jit/JitSpewer.cpp:541:7:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out.vprintf(fmt, ap);
data/mozjs78-78.4.0/js/src/jit/JitSpewer.cpp:550:7:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out.vprintf(fmt, ap);
data/mozjs78-78.4.0/js/src/jit/MIR.cpp:1139:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      out.printf(toBoolean() ? "true" : "false");
data/mozjs78-78.4.0/js/src/jit/MIR.cpp:1145:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      out.printf("0x%" PRIx64, uint64_t(toInt64()));
data/mozjs78-78.4.0/js/src/jit/MIR.cpp:1342:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out.printf(" 0x%" PRIxPTR, value().asValue());
data/mozjs78-78.4.0/js/src/jit/MIR.h:11518:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  explicit MWasmLoad(const wasm::MemoryAccessDesc& access, MIRType resultType)
data/mozjs78-78.4.0/js/src/jit/MIR.h:11519:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      : MVariadicInstruction(classOpcode), access_(access) {
data/mozjs78-78.4.0/js/src/jit/MIR.h:11529:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                        MDefinition* base, const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MIR.h:11531:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MWasmLoad* load = new (alloc) MWasmLoad(access, resultType);
data/mozjs78-78.4.0/js/src/jit/MIR.h:11544:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access() const { return access_; }
data/mozjs78-78.4.0/js/src/jit/MIR.h:11559:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  explicit MWasmStore(const wasm::MemoryAccessDesc& access)
data/mozjs78-78.4.0/js/src/jit/MIR.h:11560:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      : MVariadicInstruction(classOpcode), access_(access) {
data/mozjs78-78.4.0/js/src/jit/MIR.h:11570:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                         const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MIR.h:11572:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MWasmStore* store = new (alloc) MWasmStore(access);
data/mozjs78-78.4.0/js/src/jit/MIR.h:11586:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access() const { return access_; }
data/mozjs78-78.4.0/js/src/jit/MIR.h:11610:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasm::MemoryAccessDesc access() const {
data/mozjs78-78.4.0/js/src/jit/MIR.h:11743:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  explicit MWasmCompareExchangeHeap(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MIR.h:11746:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access_(access),
data/mozjs78-78.4.0/js/src/jit/MIR.h:11749:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    setResultType(ScalarTypeToMIRType(access.type()));
data/mozjs78-78.4.0/js/src/jit/MIR.h:11759:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                       const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MIR.h:11763:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        new (alloc) MWasmCompareExchangeHeap(access, bytecodeOffset);
data/mozjs78-78.4.0/js/src/jit/MIR.h:11777:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access() const { return access_; }
data/mozjs78-78.4.0/js/src/jit/MIR.h:11796:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  explicit MWasmAtomicExchangeHeap(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MIR.h:11799:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access_(access),
data/mozjs78-78.4.0/js/src/jit/MIR.h:11802:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    setResultType(ScalarTypeToMIRType(access.type()));
data/mozjs78-78.4.0/js/src/jit/MIR.h:11812:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                      const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MIR.h:11815:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        new (alloc) MWasmAtomicExchangeHeap(access, bytecodeOffset);
data/mozjs78-78.4.0/js/src/jit/MIR.h:11830:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access() const { return access_; }
data/mozjs78-78.4.0/js/src/jit/MIR.h:11850:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MIR.h:11854:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access_(access),
data/mozjs78-78.4.0/js/src/jit/MIR.h:11857:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    setResultType(ScalarTypeToMIRType(access.type()));
data/mozjs78-78.4.0/js/src/jit/MIR.h:11867:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                   const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MIR.h:11870:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        new (alloc) MWasmAtomicBinopHeap(op, access, bytecodeOffset);
data/mozjs78-78.4.0/js/src/jit/MIR.h:11886:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access() const { return access_; }
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.cpp:2018:22:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
void MacroAssembler::printf(const char* output) {
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.cpp:2047:22:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
void MacroAssembler::printf(const char* output, Register value) {
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2540:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmLoad(const wasm::MemoryAccessDesc& access, Operand srcAddr,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2542:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmLoadI64(const wasm::MemoryAccessDesc& access, Operand srcAddr,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2544:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStore(const wasm::MemoryAccessDesc& access, AnyRegister value,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2546:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStoreI64(const wasm::MemoryAccessDesc& access, Register64 value,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2555:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmLoad(const wasm::MemoryAccessDesc& access, Register memoryBase,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2558:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmLoadI64(const wasm::MemoryAccessDesc& access, Register memoryBase,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2561:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStore(const wasm::MemoryAccessDesc& access, AnyRegister value,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2564:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStoreI64(const wasm::MemoryAccessDesc& access, Register64 value,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2569:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmUnalignedLoad(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2578:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmUnalignedLoadFP(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2585:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmUnalignedLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2592:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmUnalignedStore(const wasm::MemoryAccessDesc& access, Register value,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2598:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmUnalignedStoreFP(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2604:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmUnalignedStoreI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2834:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2839:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2844:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2850:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2856:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2860:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2864:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2870:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2876:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2880:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2884:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2888:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2892:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2897:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2908:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2912:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2916:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2920:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2924:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2929:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2943:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicLoad64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2947:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicLoad64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2959:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2964:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2974:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2978:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2989:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2994:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:2999:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:3003:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:3009:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicEffectOp64(const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:3781:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  void printf(const char* output);
data/mozjs78-78.4.0/js/src/jit/MacroAssembler.h:3782:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  void printf(const char* output, Register value);
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:737:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                     access);
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:744:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (!IndexOf(access, &index)) {
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:746:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                     "has a load element with a non-trivial index\n", access);
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:751:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                     "has a load element with an out-of-bound index\n", access);
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:767:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                     access);
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:774:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (!IndexOf(access, &index)) {
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:776:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                     "has a store element with a non-trivial index\n", access);
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:782:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                     access);
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:790:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                     access);
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:810:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (IsElementEscaped(access, arraySize)) {
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:811:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          JitSpewDef(JitSpew_Escape, "is indirectly escaped by\n", access);
data/mozjs78-78.4.0/js/src/jit/ScalarReplacement.cpp:817:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        JitSpewDef(JitSpew_Escape, "is escaped by\n", access);
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:176:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
bool js::jit::IsUnaligned(const wasm::MemoryAccessDesc& access) {
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:177:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.align()) {
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:181:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.type() == Scalar::Float64 && access.align() >= 4) {
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:181:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.type() == Scalar::Float64 && access.align() >= 4) {
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:185:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access.align() < access.byteSize();
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:185:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access.align() < access.byteSize();
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.h:152:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
bool IsUnaligned(const wasm::MemoryAccessDesc& access);
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1866:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (mir->access().offset() || mir->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1866:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (mir->access().offset() || mir->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1874:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmLoadI64(mir->access(), HeapReg, ptr, ptr, ToOutRegister64(lir));
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1876:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmLoad(mir->access(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1894:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmUnalignedLoadI64(mir->access(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1899:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (mir->access().byteSize() == 8) {
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1902:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmUnalignedLoadFP(mir->access(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1905:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmUnalignedLoad(mir->access(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1935:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Scalar::Type accessType = mir->access().type();
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1939:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (mir->access().offset() || accessType == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1947:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmStoreI64(mir->access(),
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1951:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmStore(mir->access(),
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1972:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        mir->access(),
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1978:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmUnalignedStoreFP(mir->access(), value, HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:1981:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmUnalignedStore(mir->access(), valOrTmp, HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2083:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptrReg, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2091:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmCompareExchange(mir->access(), srcAddr, oldval, newval, out);
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2100:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptrReg, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2103:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicExchange(mir->access(), srcAddr, value, output);
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2117:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptrReg, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2118:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicFetchOp(mir->access(), op, ToRegister(value), srcAddr,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2133:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptrReg, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2134:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicEffectOp(mir->access(), op, ToRegister(value), srcAddr,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2908:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex addr(HeapReg, ptr, TimesOne, lir->mir()->access().offset());
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2909:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicLoad64(lir->mir()->access(), addr, tmp, output);
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2917:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex addr(HeapReg, ptr, TimesOne, lir->mir()->access().offset());
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2918:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicExchange64(lir->mir()->access(), addr, value, tmp);
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2927:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex addr(HeapReg, ptr, TimesOne, lir->mir()->access().offset());
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2928:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmCompareExchange64(lir->mir()->access(), addr, expected, replacement,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2937:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex addr(HeapReg, ptr, TimesOne, lir->access().offset());
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2939:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicFetchOp64(lir->access(), lir->operation(), value, addr, tmp,
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2948:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex addr(HeapReg, ptr, TimesOne, lir->access().offset());
data/mozjs78-78.4.0/js/src/jit/arm/CodeGenerator-arm.cpp:2949:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicExchange64(lir->access(), addr, value, out);
data/mozjs78-78.4.0/js/src/jit/arm/LIR-arm.h:546:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                      const wasm::MemoryAccessDesc& access, AtomicOp op)
data/mozjs78-78.4.0/js/src/jit/arm/LIR-arm.h:547:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      : LInstructionHelper(classOpcode), access_(access), op_(op) {
data/mozjs78-78.4.0/js/src/jit/arm/LIR-arm.h:556:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access() { return access_; }
data/mozjs78-78.4.0/js/src/jit/arm/LIR-arm.h:570:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                         const wasm::MemoryAccessDesc& access)
data/mozjs78-78.4.0/js/src/jit/arm/LIR-arm.h:571:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      : LInstructionHelper(classOpcode), access_(access) {
data/mozjs78-78.4.0/js/src/jit/arm/LIR-arm.h:578:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access() { return access_; }
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:558:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64 && ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:558:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64 && ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:568:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(ins->access())) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:569:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MOZ_ASSERT(!ins->access().isAtomic());
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:601:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().offset() || ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:601:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().offset() || ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:609:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:620:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64 && ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:620:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64 && ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:631:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(ins->access())) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:632:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MOZ_ASSERT(!ins->access().isAtomic());
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:660:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().offset() || ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:660:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().offset() || ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:670:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:853:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:864:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(ins->access().type() < Scalar::Float32);
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:877:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:880:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        ins->access());
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:887:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(ins->access().type() < Scalar::Float32);
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:896:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:899:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        tempFixed(FetchOpTmpLo), tempFixed(FetchOpTmpHi), ins->access(),
data/mozjs78-78.4.0/js/src/jit/arm/Lowering-arm.cpp:907:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(ins->access().type() < Scalar::Float32);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4770:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoad(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4773:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadImpl(access, memoryBase, ptr, ptrScratch, output,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4777:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4780:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT_IF(access.isAtomic(), access.byteSize() <= 4);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4780:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT_IF(access.isAtomic(), access.byteSize() <= 4);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4781:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadImpl(access, memoryBase, ptr, ptrScratch, AnyRegister(), output);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4784:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStore(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4787:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreImpl(access, value, Register64::Invalid(), memoryBase, ptr,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4791:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStoreI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4794:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(!access.isAtomic());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4795:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreImpl(access, AnyRegister(), value, memoryBase, ptr, ptrScratch);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4798:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedLoad(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4802:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmUnalignedLoadImpl(access, memoryBase, ptr, ptrScratch,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4807:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedLoadFP(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4812:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmUnalignedLoadImpl(access, memoryBase, ptr, ptrScratch, AnyRegister(outFP),
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4816:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4820:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmUnalignedLoadImpl(access, memoryBase, ptr, ptrScratch, AnyRegister(),
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4824:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedStore(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4829:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmUnalignedStoreImpl(access, FloatRegister(), Register64::Invalid(),
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4833:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedStoreFP(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4837:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmUnalignedStoreImpl(access, floatVal, Register64::Invalid(), memoryBase,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4841:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedStoreI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4845:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmUnalignedStoreImpl(access, FloatRegister(), val64, memoryBase, ptr,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4901:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4946:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4947:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, firstAccess.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4988:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4991:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4991:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4991:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4995:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4998:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4998:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:4998:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5004:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                           const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5046:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5047:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, firstAccess.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5071:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5074:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5074:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5074:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5078:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5081:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5081:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5081:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5106:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                          const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5146:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5147:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, firstAccess.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5199:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5203:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5203:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5203:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5207:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5211:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5211:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5211:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5229:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                           const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5261:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5262:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, firstAccess.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5300:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5303:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5303:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5303:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5307:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5310:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5310:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5310:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, value, mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5316:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                             const wasm::MemoryAccessDesc& access, const T& mem,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5322:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5328:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5331:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5334:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicLoad64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5337:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicLoad64(*this, access, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5340:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicLoad64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5343:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicLoad64(*this, access, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5348:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                              const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5370:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5371:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5389:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5394:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange64(*this, &access, access.sync(), mem, expect, replace,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5394:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange64(*this, &access, access.sync(), mem, expect, replace,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5398:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5403:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange64(*this, &access, access.sync(), mem, expect, replace,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5403:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange64(*this, &access, access.sync(), mem, expect, replace,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5415:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                 const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5431:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5435:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5443:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5446:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5449:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicExchange64(*this, access, mem, value, output);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5452:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5455:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicExchange64(*this, access, mem, value, output);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5460:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5482:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5486:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5517:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5520:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5524:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicFetchOp64(*this, access, op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5527:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5531:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicFetchOp64(*this, access, op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5956:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssemblerARM::wasmLoadImpl(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5962:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5965:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Scalar::Type type = access.type();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5977:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5979:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5988:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5994:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:5998:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6016:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6020:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6024:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6027:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssemblerARM::wasmStoreImpl(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6033:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6036:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6037:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Scalar::Type type = access.type();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6047:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6055:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    append(access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6061:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    append(access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6072:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      append(access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6080:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      append(access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6084:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6088:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, Register memoryBase, Register ptr,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6095:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6107:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6110:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Scalar::Type type = access.type();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6117:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6119:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6124:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      emitUnalignedLoad(&access, /*signed*/ false, /*size*/ 4, ptr, tmp, tmp2);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6132:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      emitUnalignedLoad(&access, /*signed=*/false, /*size=*/4, ptr, tmp, tmp3,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6142:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      emitUnalignedLoad(&access, /*signed=*/false, /*size=*/4, ptr, tmp,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6155:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        emitUnalignedLoad(&access, isSigned, byteSize, ptr, tmp, out64.low);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6162:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        emitUnalignedLoad(&access, isSigned, byteSize, ptr, tmp, outAny.gpr());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6173:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6177:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, FloatRegister floatValue,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6187:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6190:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6202:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6209:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      emitUnalignedStore(&access, /*size=*/4, ptr, val64.high, /*offset=*/4);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6212:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      emitUnalignedStore(&access, byteSize, ptr, val64.low);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6219:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      emitUnalignedStore(&access, /*size=*/4, ptr, valOrTmp, /*offset=*/4);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6224:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      emitUnalignedStore(&access, /*size=*/4, ptr, valOrTmp);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6228:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    emitUnalignedStore(&access, byteSize, ptr, valOrTmp);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6231:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6234:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssemblerARM::emitUnalignedLoad(const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6269:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6270:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    append(*access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6283:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssemblerARM::emitUnalignedStore(const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6316:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (i == (int)byteSize - 1 && access) {
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:6317:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      append(*access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.h:541:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmLoadImpl(const wasm::MemoryAccessDesc& access, Register memoryBase,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.h:546:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStoreImpl(const wasm::MemoryAccessDesc& access, AnyRegister valAny,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.h:552:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmUnalignedLoadImpl(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.h:561:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmUnalignedStoreImpl(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.h:574:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void emitUnalignedLoad(const wasm::MemoryAccessDesc* access, bool isSigned,
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.h:584:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void emitUnalignedStore(const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm/disasm/Disasm-arm.cpp:47:16:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int result = vsnprintf(str.start(), str.length(), format, args);
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:310:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssemblerCompat::wasmLoadImpl(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:314:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:325:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:335:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    append(access, asMasm().currentOffset());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:336:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:377:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:380:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssemblerCompat::wasmStoreImpl(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:384:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:395:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:405:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    append(access, asMasm().currentOffset());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:406:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:437:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1367:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoad(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1370:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadImpl(access, memoryBase, ptr, ptrScratch, output,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1374:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1377:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadImpl(access, memoryBase, ptr, ptrScratch, AnyRegister(), output);
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1380:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStore(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1383:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreImpl(access, value, Register64::Invalid(), memoryBase, ptr,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1387:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStoreI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1390:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreImpl(access, AnyRegister(), value, memoryBase, ptr, ptrScratch);
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1529:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                          const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1545:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access) {
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1546:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.append(*access, masm.currentOffset());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1560:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access) {
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1561:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.append(*access, masm.currentOffset());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1575:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access) {
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1576:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.append(*access, masm.currentOffset());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1590:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access) {
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1591:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.append(*access, masm.currentOffset());
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1623:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1643:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LoadExclusive(masm, access, type, targetWidth, ptr, output);
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1655:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                           const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1671:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LoadExclusive(masm, access, type, targetWidth, ptr, output);
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1680:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                          const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1697:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LoadExclusive(masm, access, type, targetWidth, ptr, output);
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1761:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1764:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1764:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1764:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1768:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1771:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1771:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1771:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1789:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1792:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1792:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1792:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1796:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1799:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1799:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1799:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), Width::_32, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1819:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1823:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1823:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1823:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1827:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1831:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1831:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1831:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1835:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1838:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<false>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1838:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<false>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1838:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<false>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1842:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1845:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<false>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1845:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<false>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1845:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<false>(*this, &access, access.type(), Width::_32, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1849:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1854:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, Scalar::Int64, Width::_64, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1854:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, Scalar::Int64, Width::_64, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1858:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1863:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, Scalar::Int64, Width::_64, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1863:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, Scalar::Int64, Width::_64, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1867:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1870:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, Scalar::Int64, Width::_64, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1870:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, Scalar::Int64, Width::_64, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1874:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1877:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, Scalar::Int64, Width::_64, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1877:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, Scalar::Int64, Width::_64, access.sync(), mem,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1881:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1885:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, Scalar::Int64, Width::_64, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1885:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, Scalar::Int64, Width::_64, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1889:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1893:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, Scalar::Int64, Width::_64, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.cpp:1893:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp<true>(*this, &access, Scalar::Int64, Width::_64, access.sync(),
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.h:1999:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmLoadImpl(const wasm::MemoryAccessDesc& access, Register memoryBase,
data/mozjs78-78.4.0/js/src/jit/arm64/MacroAssembler-arm64.h:2002:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStoreImpl(const wasm::MemoryAccessDesc& access, AnyRegister valany,
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Debugger-vixl.cpp:233:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(out, fmt_, value);
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3490:18:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  buffer_pos_ += vsnprintf(&buffer_[buffer_pos_], buffer_size_ - buffer_pos_,
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instructions-vixl.h:605:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(form_buffer_, sizeof(form_buffer_), string,
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instrument-vixl.cpp:232:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(stderr, error_message, name);
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instrument-vixl.cpp:233:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(output_stream_, error_message, name);
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-vixl.cpp:3967:41:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        case kPrintfArgW: part_result = printf(chunks[i], wreg(pcs_r++)); break;
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-vixl.cpp:3968:41:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        case kPrintfArgX: part_result = printf(chunks[i], xreg(pcs_r++)); break;
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-vixl.cpp:3969:41:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        case kPrintfArgD: part_result = printf(chunks[i], dreg(pcs_f++)); break;
data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.h:1479:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
inline bool IsUnaligned(const wasm::MemoryAccessDesc& access) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.h:1480:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.align()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.h:1485:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.type() == Scalar::Int64 && access.align() >= 4) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.h:1485:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.type() == Scalar::Int64 && access.align() >= 4) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.h:1490:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access.align() < access.byteSize();
data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.h:1490:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access.align() < access.byteSize();
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1539:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(mir->access())) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1541:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmUnalignedLoadFP(mir->access(), HeapReg, ToRegister(lir->ptr()),
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1546:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmUnalignedLoad(mir->access(), HeapReg, ToRegister(lir->ptr()),
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1551:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmLoad(mir->access(), HeapReg, ToRegister(lir->ptr()), ptrScratch,
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1571:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(mir->access())) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1572:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (mir->access().type() == Scalar::Float32 ||
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1573:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        mir->access().type() == Scalar::Float64) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1574:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmUnalignedStoreFP(mir->access(), ToFloatRegister(lir->value()),
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1578:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmUnalignedStore(mir->access(), ToRegister(lir->value()), HeapReg,
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1583:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmStore(mir->access(), ToAnyRegister(lir->value()), HeapReg,
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1603:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (mir->access().type()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1718:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (mir->access().type()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1821:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptrReg, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1830:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmCompareExchange(mir->access(), srcAddr, oldval, newval, valueTemp,
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1838:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptrReg, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1845:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicExchange(mir->access(), srcAddr, value, valueTemp, offsetTemp,
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1859:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptrReg, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1861:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicFetchOp(mir->access(), mir->operation(),
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1877:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptrReg, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:1878:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicEffectOp(mir->access(), mir->operation(),
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:2192:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = lir->mir()->access().offset();
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:2195:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmCompareExchange64(lir->mir()->access(), addr, oldValue, newValue,
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:2203:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = lir->mir()->access().offset();
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:2206:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicExchange64(lir->mir()->access(), addr, value, output);
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:2218:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = lir->mir()->access().offset();
data/mozjs78-78.4.0/js/src/jit/mips-shared/CodeGenerator-mips-shared.cpp:2222:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicFetchOp64(lir->mir()->access(), lir->mir()->operation(), value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:336:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(ins->access())) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:339:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:348:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:358:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:365:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:374:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:387:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(ins->access())) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:389:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:393:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:404:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:412:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:414:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:425:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:436:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().offset()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:486:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(ins->access().offset() == 0);
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:511:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(ins->access().offset() == 0);
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:622:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:634:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().byteSize() < 4) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:650:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:661:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().byteSize() < 4) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:676:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/Lowering-mips-shared.cpp:691:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().byteSize() < 4) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:496:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, Register dest, const BaseIndex& src,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:547:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:651:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, Register data, const BaseIndex& dest,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:692:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1850:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoad(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1853:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadImpl(access, memoryBase, ptr, ptrScratch, output, InvalidReg);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1856:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedLoad(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1860:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadImpl(access, memoryBase, ptr, ptrScratch, AnyRegister(output), tmp);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1863:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedLoadFP(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1870:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadImpl(access, memoryBase, ptr, ptrScratch, AnyRegister(output), tmp1);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1873:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStore(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1876:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreImpl(access, value, memoryBase, ptr, ptrScratch, InvalidReg);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1879:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedStore(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1883:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreImpl(access, AnyRegister(value), memoryBase, ptr, ptrScratch, tmp);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1886:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedStoreFP(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1890:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreImpl(access, AnyRegister(floatValue), memoryBase, ptr, ptrScratch,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1895:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, Register memoryBase, Register ptr,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1897:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1907:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1911:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1941:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(access)) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1945:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        asMasm().loadUnalignedFloat32(access, address, tmp, output.fpu());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1947:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        asMasm().loadUnalignedDouble(access, address, tmp, output.fpu());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1950:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      asMasm().ma_load_unaligned(access, output.gpr(), address, tmp,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1957:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1969:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().append(access, asMasm().size() - 4);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1970:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1974:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, AnyRegister value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1976:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1986:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1990:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2023:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(access)) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2027:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        asMasm().storeUnalignedFloat32(access, value.fpu(), tmp, address);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2029:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        asMasm().storeUnalignedDouble(access, value.fpu(), tmp, address);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2032:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      asMasm().ma_store_unaligned(access, value.gpr(), address, tmp,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2039:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2052:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().append(access, asMasm().size() - 4);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2053:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2066:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2095:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2096:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2126:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2127:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2191:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2196:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2196:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2196:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2200:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2205:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2205:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2205:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), access.sync(), mem, oldval,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2211:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                           const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2240:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2241:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2278:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2279:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2331:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2335:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2335:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2335:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2339:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2343:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2343:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2343:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), access.sync(), mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2349:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                          const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2378:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2379:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2427:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2428:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2511:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2516:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2516:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2516:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2520:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2525:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2525:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2525:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2531:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                           const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2559:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2560:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2608:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2609:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2657:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2662:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2662:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2662:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2666:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2671:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2671:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:2671:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), access.sync(), op, mem, value,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.h:104:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void ma_load_unaligned(const wasm::MemoryAccessDesc& access, Register dest,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.h:114:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void ma_store_unaligned(const wasm::MemoryAccessDesc& access, Register data,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.h:232:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmLoadImpl(const wasm::MemoryAccessDesc& access, Register memoryBase,
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.h:235:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStoreImpl(const wasm::MemoryAccessDesc& access, AnyRegister value,
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:302:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(mir->access())) {
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:303:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmUnalignedLoadI64(mir->access(), HeapReg, ToRegister(lir->ptr()),
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:307:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmLoadI64(mir->access(), HeapReg, ToRegister(lir->ptr()), ptrScratch,
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:329:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(mir->access())) {
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:330:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmUnalignedStoreI64(mir->access(), ToRegister64(lir->value()),
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:334:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmStoreI64(mir->access(), ToRegister64(lir->value()), HeapReg,
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:549:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = lir->mir()->access().offset();
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:553:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicLoad64(lir->mir()->access(), addr, Register64::Invalid(),
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:561:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = lir->mir()->access().offset();
data/mozjs78-78.4.0/js/src/jit/mips32/CodeGenerator-mips32.cpp:565:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicStore64(lir->mir()->access(), addr, tmp, value);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1077:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, const BaseIndex& src, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1087:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1091:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1098:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1102:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1108:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, const BaseIndex& src, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1123:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1230:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, FloatRegister src, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1247:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1251:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, FloatRegister src, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:1276:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2348:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2351:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadI64Impl(access, memoryBase, ptr, ptrScratch, output, InvalidReg);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2354:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2358:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadI64Impl(access, memoryBase, ptr, ptrScratch, output, tmp);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2361:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStoreI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2364:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreI64Impl(access, value, memoryBase, ptr, ptrScratch, InvalidReg);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2367:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedStoreI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2371:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreI64Impl(access, value, memoryBase, ptr, ptrScratch, tmp);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2375:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, Register memoryBase, Register ptr,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2377:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2387:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2390:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2418:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(access)) {
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2421:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      asMasm().ma_load_unaligned(access, output.low, address, tmp,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2431:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      asMasm().ma_load_unaligned(access, output.low, address, tmp, SizeWord,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2434:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          access, output.high,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2441:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2446:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    asMasm().append(access, asMasm().size() - 4);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2455:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    asMasm().append(access, asMasm().size() - 4);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2459:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    asMasm().append(access, asMasm().size() - 4);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2461:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2465:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, Register64 value, Register memoryBase,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2467:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2477:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2479:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2507:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(access)) {
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2510:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      asMasm().ma_store_unaligned(access, value.low, address, tmp,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2515:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          access, value.high,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2518:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      asMasm().ma_store_unaligned(access, value.low, address, tmp, SizeWord,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2524:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2528:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    asMasm().append(access, asMasm().size() - 4);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2533:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    asMasm().append(access, asMasm().size() - 4);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2536:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2540:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2545:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2573:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                         const wasm::MemoryAccessDesc& access, const T& mem,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2579:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  EnterAtomic64Region(masm, access, /* addr= */ SecondScratchReg,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2588:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicLoad64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2591:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicLoad64(*this, access, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2594:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicLoad64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2597:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicLoad64(*this, access, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2602:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, const T& mem, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2606:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  EnterAtomic64Region(asMasm(), access, /* addr= */ SecondScratchReg,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2615:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, const Address& mem, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2618:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, const BaseIndex& mem, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2623:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                  const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2634:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  EnterAtomic64Region(masm, access, /* addr= */ SecondScratchReg,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2647:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2652:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmCompareExchange64(*this, access, mem, expect, replace, output);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2655:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2660:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmCompareExchange64(*this, access, mem, expect, replace, output);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2665:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                 const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2671:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  EnterAtomic64Region(masm, access, /* addr= */ SecondScratchReg,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2681:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2684:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicExchange64(*this, access, mem, src, output);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2687:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2690:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicExchange64(*this, access, mem, src, output);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2695:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2700:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  EnterAtomic64Region(masm, access, /* addr= */ SecondScratchReg,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2740:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2744:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp64(*this, access, op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2747:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.cpp:2751:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp64(*this, access, op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.h:574:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmAtomicStore64(const wasm::MemoryAccessDesc& access, const T& mem,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.h:647:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void loadUnalignedDouble(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.h:651:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void loadUnalignedFloat32(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.h:720:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void storeUnalignedFloat32(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.h:723:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void storeUnalignedDouble(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.h:755:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmLoadI64Impl(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips32/MacroAssembler-mips32.h:758:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStoreI64Impl(const wasm::MemoryAccessDesc& access, Register64 value,
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:735:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(llvmcmd,
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:740:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if (system(llvmcmd)) {
data/mozjs78-78.4.0/js/src/jit/mips64/CodeGenerator-mips64.cpp:342:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(mir->access())) {
data/mozjs78-78.4.0/js/src/jit/mips64/CodeGenerator-mips64.cpp:343:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmUnalignedLoadI64(mir->access(), HeapReg, ToRegister(lir->ptr()),
data/mozjs78-78.4.0/js/src/jit/mips64/CodeGenerator-mips64.cpp:347:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmLoadI64(mir->access(), HeapReg, ToRegister(lir->ptr()), ptrScratch,
data/mozjs78-78.4.0/js/src/jit/mips64/CodeGenerator-mips64.cpp:369:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(mir->access())) {
data/mozjs78-78.4.0/js/src/jit/mips64/CodeGenerator-mips64.cpp:370:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmUnalignedStoreI64(mir->access(), ToRegister64(lir->value()),
data/mozjs78-78.4.0/js/src/jit/mips64/CodeGenerator-mips64.cpp:374:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmStoreI64(mir->access(), ToRegister64(lir->value()), HeapReg,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:995:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, const BaseIndex& src, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:1009:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:1014:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, const BaseIndex& src, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:1028:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, load.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:1138:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, FloatRegister src, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:1153:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:1157:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, FloatRegister src, Register temp,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:1173:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, store.getOffset());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2130:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2133:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadI64Impl(access, memoryBase, ptr, ptrScratch, output, InvalidReg);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2136:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2140:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmLoadI64Impl(access, memoryBase, ptr, ptrScratch, output, tmp);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2143:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStoreI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2146:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreI64Impl(access, value, memoryBase, ptr, ptrScratch, InvalidReg);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2149:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmUnalignedStoreI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2153:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStoreI64Impl(access, value, memoryBase, ptr, ptrScratch, tmp);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2267:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, Register memoryBase, Register ptr,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2269:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2279:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2282:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2309:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(access)) {
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2311:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    asMasm().ma_load_unaligned(access, output.reg, address, tmp,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2317:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2321:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().append(access, asMasm().size() - 4);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2322:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2326:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const wasm::MemoryAccessDesc& access, Register64 value, Register memoryBase,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2328:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2338:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  unsigned byteSize = access.byteSize();
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2340:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2368:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (IsUnaligned(access)) {
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2370:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    asMasm().ma_store_unaligned(access, value.reg, address, tmp,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2376:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2380:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().append(access, asMasm().size() - 4);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2381:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  asMasm().memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2386:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                  const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2394:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2398:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2407:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2412:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2417:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmCompareExchange64(*this, access, mem, expect, replace, output);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2420:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2425:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmCompareExchange64(*this, access, mem, expect, replace, output);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2430:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                             const wasm::MemoryAccessDesc& access, const T& mem,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2436:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2440:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2448:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2451:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2454:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange64(*this, access, mem, src, output);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2457:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2460:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange64(*this, access, mem, src, output);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2465:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            const wasm::MemoryAccessDesc& access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2472:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2476:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2502:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2505:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2509:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp64(*this, access, op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2512:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.cpp:2516:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp64(*this, access, op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.h:661:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void loadUnalignedDouble(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.h:664:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void loadUnalignedFloat32(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.h:727:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void storeUnalignedFloat32(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.h:730:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void storeUnalignedDouble(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.h:767:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmLoadI64Impl(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/mips64/MacroAssembler-mips64.h:770:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStoreI64Impl(const wasm::MemoryAccessDesc& access, Register64 value,
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:545:20:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (stopAtStr && sscanf(stopAtStr, "%" PRIi64, &stopAt) == 1) {
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:642:12:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    return sscanf(desc, "%" PRIu64, reinterpret_cast<uint64_t*>(value)) == 1;
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:644:10:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  return sscanf(desc, "%" PRIi64, value) == 1;
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:768:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(llvmcmd,
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:773:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if (system(llvmcmd)) {
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:897:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf("  %p:  0x%016" PRIx64 " %20" PRIi64, cur, *cur, *cur);
data/mozjs78-78.4.0/js/src/jit/shared/Assembler-shared.h:580:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void append(const wasm::MemoryAccessDesc& access, uint32_t pcOffset) {
data/mozjs78-78.4.0/js/src/jit/shared/Assembler-shared.h:581:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    appendOutOfBoundsTrap(access.trapOffset(), pcOffset);
data/mozjs78-78.4.0/js/src/jit/shared/Assembler-shared.h:587:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void append(wasm::SymbolicAccess access) {
data/mozjs78-78.4.0/js/src/jit/shared/Assembler-shared.h:588:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    enoughMemory_ &= symbolicAccesses_.append(access);
data/mozjs78-78.4.0/js/src/jit/shared/Disassembler-shared.cpp:73:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(fmt2, sizeof(prefix_fmt), prefix_fmt,
data/mozjs78-78.4.0/js/src/jit/shared/Disassembler-shared.cpp:75:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(fmt2, fmt);
data/mozjs78-78.4.0/js/src/jit/shared/Disassembler-shared.cpp:88:15:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printer_->vprintf(fmt, va);
data/mozjs78-78.4.0/js/src/jit/shared/Disassembler-shared.cpp:153:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(buffer, bufsize, "%" PRIi64, doc.value.i64);
data/mozjs78-78.4.0/js/src/jit/shared/Disassembler-shared.cpp:156:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(buffer, bufsize, "%" PRIu64, doc.value.u64);
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:374:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void CodeGeneratorX64::wasmStore(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:377:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:383:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:384:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:408:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:410:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmStore(access, ToAnyRegister(value), dstAddr);
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:423:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = mir->access().offset();
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:432:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmLoadI64(mir->access(), srcAddr, ToOutRegister64(ins));
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:434:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmLoad(mir->access(), srcAddr, ToAnyRegister(ins->output()));
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:445:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access = mir->access();
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:447:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = access.offset();
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:456:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  wasmStore(access, value, dstAddr);
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:474:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Scalar::Type accessType = mir->access().type();
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:475:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptr, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:478:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmCompareExchange64(mir->access(), srcAddr, Register64(oldval),
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:481:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmCompareExchange(mir->access(), srcAddr, oldval, newval,
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:493:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Scalar::Type accessType = mir->access().type();
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:495:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptr, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:498:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicExchange64(mir->access(), srcAddr, Register64(value),
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:501:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicExchange(mir->access(), srcAddr, value,
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:517:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Scalar::Type accessType = mir->access().type();
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:523:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptr, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:529:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicFetchOp64(mir->access(), op, val, srcAddr, tmp, out);
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:531:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicFetchOp(mir->access(), op, Imm32(ToInt32(value)), srcAddr,
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:534:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicFetchOp(mir->access(), op, ToRegister(value), srcAddr, temp,
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:548:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Scalar::Type accessType = mir->access().type();
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:551:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex srcAddr(HeapReg, ptr, TimesOne, mir->access().offset());
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:555:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicEffectOp64(mir->access(), op, val, srcAddr);
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:563:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicEffectOp(mir->access(), op, c, srcAddr, InvalidReg);
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.cpp:565:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicEffectOp(mir->access(), op, ToRegister(value), srcAddr,
data/mozjs78-78.4.0/js/src/jit/x64/CodeGenerator-x64.h:26:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void wasmStore(const wasm::MemoryAccessDesc& access, const LAllocation* value,
data/mozjs78-78.4.0/js/src/jit/x64/Lowering-x64.cpp:197:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (ins->access().type()) {
data/mozjs78-78.4.0/js/src/jit/x64/Lowering-x64.cpp:276:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  bool canTakeConstant = ins->access().type() != Scalar::Int64;
data/mozjs78-78.4.0/js/src/jit/x64/Lowering-x64.cpp:1263:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buf, "shuffle -> permute 16x8%s%s%s",
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:605:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoad(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:607:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:609:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:610:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:645:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:648:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:650:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:652:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:653:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:687:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:690:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStore(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:692:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:694:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:695:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:727:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:918:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:927:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:931:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:940:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:944:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:950:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:954:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:960:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:966:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            const wasm::MemoryAccessDesc* access, AtomicOp op,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:973:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access) {
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:974:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:982:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access) {
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:983:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:989:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access) {
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:990:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:1013:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:1017:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp64(*this, &access, op, value.reg, mem, temp.reg, output.reg);
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:1020:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:1024:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp64(*this, &access, op, value.reg, mem, temp.reg, output.reg);
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:1027:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x64/MacroAssembler-x64.cpp:1030:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/CodeGenerator-x86-shared.cpp:381:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(mir->access().offset() == 0);
data/mozjs78-78.4.0/js/src/jit/x86-shared/CodeGenerator-x86-shared.cpp:410:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmLoad(mir->access(), srcAddr, out);
data/mozjs78-78.4.0/js/src/jit/x86-shared/CodeGenerator-x86-shared.cpp:475:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmStore(mir->access(), ToAnyRegister(value), dstAddr);
data/mozjs78-78.4.0/js/src/jit/x86-shared/Lowering-x86-shared.cpp:323:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (ins->access().type()) {
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:992:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1001:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1002:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1033:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1036:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), mem, oldval, newval, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1036:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), mem, oldval, newval, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1039:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1042:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), mem, oldval, newval, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1042:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CompareExchange(*this, &access, access.type(), mem, oldval, newval, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1047:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                           const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1056:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1057:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1089:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1092:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), mem, value, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1092:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), mem, value, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1095:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1098:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), mem, value, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1098:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicExchange(*this, &access, access.type(), mem, value, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1122:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                          const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1131:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access) masm.append(*access, masm.size()); \
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1131:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access) masm.append(*access, masm.size()); \
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1152:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          if (access) masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1152:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          if (access) masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1176:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          if (access) masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1176:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          if (access) masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1197:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          if (access) masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1197:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          if (access) masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1247:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1251:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1251:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1254:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1258:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1258:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1261:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1265:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1265:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1268:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1272:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1272:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicFetchOp(*this, &access, access.type(), op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1277:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                           const wasm::MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1280:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1281:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(*access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1353:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1357:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), op, value, mem);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1357:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), op, value, mem);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1360:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1364:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), op, value, mem);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1364:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), op, value, mem);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1367:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1371:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), op, value, mem);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1371:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), op, value, mem);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1374:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicEffectOp(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1378:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), op, value, mem);
data/mozjs78-78.4.0/js/src/jit/x86-shared/MacroAssembler-x86-shared.cpp:1378:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicEffectOp(*this, &access, access.type(), op, value, mem);
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:249:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = mir->access().offset();
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:265:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MOZ_ASSERT_IF(mir->access().isAtomic(),
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:266:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                  mir->access().type() != Scalar::Int64);
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:267:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmLoadI64(mir->access(), srcAddr, ToOutRegister64(ins));
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:269:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmLoad(mir->access(), srcAddr, ToAnyRegister(ins->output()));
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:281:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = mir->access().offset();
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:296:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (mir->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:299:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmStoreI64(mir->access(), value, dstAddr);
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:302:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmStore(mir->access(), value, dstAddr);
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:323:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.leal(Operand(memoryBase, ptrReg, TimesOne, mir->access().offset()),
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:327:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmCompareExchange(mir->access(), memAddr, oldval, newval, output);
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:339:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.leal(Operand(memoryBase, ptrReg, TimesOne, mir->access().offset()),
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:343:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicExchange(mir->access(), memAddr, value, output);
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:358:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.leal(Operand(memoryBase, ptrReg, TimesOne, mir->access().offset()),
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:363:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicFetchOp(mir->access(), op, Imm32(ToInt32(value)), memAddr,
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:366:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicFetchOp(mir->access(), op, ToRegister(value), memAddr, temp,
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:382:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.leal(Operand(memoryBase, ptrReg, TimesOne, mir->access().offset()),
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:387:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicEffectOp(mir->access(), op, Imm32(ToInt32(value)), memAddr,
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:390:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicEffectOp(mir->access(), op, ToRegister(value), memAddr,
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:396:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = ins->mir()->access().offset();
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:408:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicLoad64(ins->mir()->access(), srcAddr, Register64(ecx, ebx),
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:413:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = ins->mir()->access().offset();
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:427:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(ins->mir()->access(), masm.size());
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:433:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    T* ins, const wasm::MemoryAccessDesc& access) {
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:434:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(access.offset() < wasm::MaxOffsetGuardLimit);
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:439:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                  access.offset());
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:453:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:462:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  emitWasmStoreOrExchangeAtomicI64(ins, ins->mir()->access());
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:469:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  emitWasmStoreOrExchangeAtomicI64(ins, ins->access());
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:473:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t offset = ins->access().offset();
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.cpp:500:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.wasmAtomicFetchOp64(ins->access(), ins->operation(), valueAddr, srcAddr,
data/mozjs78-78.4.0/js/src/jit/x86/CodeGenerator-x86.h:32:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                        const wasm::MemoryAccessDesc& access);
data/mozjs78-78.4.0/js/src/jit/x86/LIR-x86.h:265:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                         const wasm::MemoryAccessDesc& access)
data/mozjs78-78.4.0/js/src/jit/x86/LIR-x86.h:266:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      : LInstructionHelper(classOpcode), access_(access) {
data/mozjs78-78.4.0/js/src/jit/x86/LIR-x86.h:275:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access() { return access_; }
data/mozjs78-78.4.0/js/src/jit/x86/LIR-x86.h:288:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                      const wasm::MemoryAccessDesc& access, AtomicOp op)
data/mozjs78-78.4.0/js/src/jit/x86/LIR-x86.h:289:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      : LInstructionHelper(classOpcode), access_(access), op_(op) {
data/mozjs78-78.4.0/js/src/jit/x86/LIR-x86.h:298:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const wasm::MemoryAccessDesc& access() { return access_; }
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:264:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                      const wasm::MemoryAccessDesc& access) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:268:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!(base->toConstant()->isInt32(0) || access.offset() == 0)) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:271:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:277:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      v = access.offset();
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:298:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64 && ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:298:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64 && ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:309:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!base->isConstant() || !OptimizableConstantAccess(base, ins->access())) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:327:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Scalar::Type accessType = ins->access().type();
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:347:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64 && ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:347:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64 && ins->access().isAtomic()) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:357:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!base->isConstant() || !OptimizableConstantAccess(base, ins->access())) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:362:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (ins->access().type()) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:405:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:416:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(ins->access().type() < Scalar::Float32);
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:418:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  bool byteArray = byteSize(ins->access().type()) == 1;
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:448:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:452:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        useInt64Fixed(ins->value(), Register64(ecx, ebx)), ins->access());
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:466:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (byteSize(ins->access().type()) == 1) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:480:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ins->access().type() == Scalar::Int64) {
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:484:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            ins->access(), ins->operation());
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:491:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(ins->access().type() < Scalar::Float32);
data/mozjs78-78.4.0/js/src/jit/x86/Lowering-x86.cpp:493:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  bool byteArray = byteSize(ins->access().type()) == 1;
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:581:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoad(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:586:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:588:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:589:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:621:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:624:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmLoadI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:627:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT_IF(access.isAtomic(), access.byteSize() <= 4);
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:627:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT_IF(access.isAtomic(), access.byteSize() <= 4);
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:631:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:633:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:634:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:679:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      append(access, size());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:695:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:698:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStore(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:703:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierBefore(access.sync());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:705:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:706:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.type()) {
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:735:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  memoryBarrierAfter(access.sync());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:738:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmStoreI64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:741:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_ASSERT(!access.isAtomic());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:745:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:748:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  append(access, size());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:754:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                         const wasm::MemoryAccessDesc& access, const T& address,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:766:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:770:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicLoad64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:773:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicLoad64(*this, access, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:776:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicLoad64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:779:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  AtomicLoad64(*this, access, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:784:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                  const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:793:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:797:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:802:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmCompareExchange64(*this, access, mem, expected, replacement, output);
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:805:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmCompareExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:810:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmCompareExchange64(*this, access, mem, expected, replacement, output);
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:815:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                 const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:828:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  masm.append(access, masm.size());
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:833:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:836:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicExchange64(*this, access, mem, value, output);
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:839:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicExchange64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:842:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicExchange64(*this, access, mem, value, output);
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:847:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:859:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.append(access, masm.size());                      \
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:892:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:896:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicFetchOp64(*this, access, op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:899:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void MacroAssembler::wasmAtomicFetchOp64(const wasm::MemoryAccessDesc& access,
data/mozjs78-78.4.0/js/src/jit/x86/MacroAssembler-x86.cpp:903:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  WasmAtomicFetchOp64(*this, access, op, value, mem, temp, output);
data/mozjs78-78.4.0/js/src/jsdate.cpp:2980:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, js_InvalidDate_str);
data/mozjs78-78.4.0/js/src/jsnum.cpp:989:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tmpDest, rt->thousandsSeparator);
data/mozjs78-78.4.0/js/src/jsnum.cpp:1002:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tmpDest, rt->decimalSeparator);
data/mozjs78-78.4.0/js/src/jsnum.cpp:1005:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tmpDest, nint + 1);
data/mozjs78-78.4.0/js/src/jsnum.cpp:1008:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tmpDest, nint);
data/mozjs78-78.4.0/js/src/new-regexp/regexp-shim.cc:25:3:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vprintf(format, arguments);
data/mozjs78-78.4.0/js/src/new-regexp/regexp-shim.cc:32:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(out, format, arguments);
data/mozjs78-78.4.0/js/src/shell/OSObject.cpp:923:16:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  int result = system(command.get());
data/mozjs78-78.4.0/js/src/shell/OSObject.cpp:968:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  execvp("sh", (char* const*)cmd);
data/mozjs78-78.4.0/js/src/shell/js.cpp:6088:7:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      execv(sArgv[0], argv.get());
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:60:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, fmt, args);
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:182:22:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      size_t chars = printf(fmt, arg->longflag);
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:218:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          chars = printf(fmt, opt->shortflag, opt->longflag,
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:221:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          chars = printf(fmt, opt->longflag, opt->asValued()->metavar);
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:225:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          chars = printf(fmt, opt->shortflag, opt->longflag);
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:227:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          chars = printf(fmt, opt->longflag);
data/mozjs78-78.4.0/js/src/util/DoubleToString.cpp:304:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p, !word1(d) && !(word0(d) & Frac_mask) ? "Infinity" : "NaN");
data/mozjs78-78.4.0/js/src/vm/AtomsTable.h:188:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void tracePinnedAtoms(JSTracer* trc, const AutoAccessAtomsZone& access);
data/mozjs78-78.4.0/js/src/vm/BigIntType.cpp:3646:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    out.printf("%" PRIu64, d);
data/mozjs78-78.4.0/js/src/vm/BigIntType.cpp:3652:13:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        out.printf("%.8" PRIX32, uint32_t(d));
data/mozjs78-78.4.0/js/src/vm/BigIntType.cpp:3654:13:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        out.printf("%.16" PRIX64, d);
data/mozjs78-78.4.0/js/src/vm/DateTime.cpp:639:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  std::strcpy(linkName, tz);
data/mozjs78-78.4.0/js/src/vm/DateTime.cpp:668:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      std::strcpy(linkName, linkTarget);
data/mozjs78-78.4.0/js/src/vm/DateTime.cpp:679:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      std::strcpy(linkName, linkTarget);
data/mozjs78-78.4.0/js/src/vm/DateTime.cpp:692:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    std::strcat(linkName, linkTarget);
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2086:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    AccessResult access;
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2087:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!handleUnaliasedAccess(cx, debugEnv, env, id, GET, &v, &access)) {
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2091:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access) {
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2164:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    AccessResult access;
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2165:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!handleUnaliasedAccess(cx, debugEnv, env, id, GET, vp, &access)) {
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2169:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access) {
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2233:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    AccessResult access;
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2234:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!handleUnaliasedAccess(cx, debugEnv, env, id, GET, vp, &access)) {
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2238:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access) {
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2274:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    AccessResult access;
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2276:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!handleUnaliasedAccess(cx, debugEnv, env, id, SET, &valCopy, &access)) {
data/mozjs78-78.4.0/js/src/vm/EnvironmentObject.cpp:2280:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access) {
data/mozjs78-78.4.0/js/src/vm/ErrorReporting.cpp:420:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(message, nbytes, defaultErrorMessage, errorNumber);
data/mozjs78-78.4.0/js/src/vm/JSAtom.cpp:418:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                  const AutoAccessAtomsZone& access) {
data/mozjs78-78.4.0/js/src/vm/JSAtom.cpp:428:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void js::TraceAtoms(JSTracer* trc, const AutoAccessAtomsZone& access) {
data/mozjs78-78.4.0/js/src/vm/JSAtom.cpp:431:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    rt->atoms().tracePinnedAtoms(trc, access);
data/mozjs78-78.4.0/js/src/vm/JSAtom.h:47:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void TraceAtoms(JSTracer* trc, const AutoAccessAtomsZone& access);
data/mozjs78-78.4.0/js/src/vm/JSContext.h:362:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const JS::Zone* atomsZone(const js::AutoAccessAtomsZone& access) {
data/mozjs78-78.4.0/js/src/vm/JSContext.h:363:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return runtime_->atomsZone(access);
data/mozjs78-78.4.0/js/src/vm/JSONPrinter.cpp:93:8:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out_.vprintf(format, ap);
data/mozjs78-78.4.0/js/src/vm/JSONPrinter.cpp:102:8:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out_.vprintf(format, ap);
data/mozjs78-78.4.0/js/src/vm/JSONPrinter.cpp:114:8:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out_.vprintf(format, ap);
data/mozjs78-78.4.0/js/src/vm/JSONPrinter.cpp:123:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out_.printf("%" PRId32, value);
data/mozjs78-78.4.0/js/src/vm/JSONPrinter.cpp:136:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out_.printf("%" PRIu32, value);
data/mozjs78-78.4.0/js/src/vm/JSONPrinter.cpp:141:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out_.printf("%" PRId64, value);
data/mozjs78-78.4.0/js/src/vm/JSONPrinter.cpp:146:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  out_.printf("%" PRIu64, value);
data/mozjs78-78.4.0/js/src/vm/JSObject.cpp:3264:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(buf, bufsize, pattern, slotname);
data/mozjs78-78.4.0/js/src/vm/JSObject.cpp:3272:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(buf, bufsize, "%" PRId32, JSID_TO_INT(propid));
data/mozjs78-78.4.0/js/src/vm/Printer.cpp:52:22:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
bool GenericPrinter::printf(const char* fmt, ...) {
data/mozjs78-78.4.0/js/src/vm/Printer.cpp:55:12:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  bool r = vprintf(fmt, va);
data/mozjs78-78.4.0/js/src/vm/Printer.cpp:60:22:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
bool GenericPrinter::vprintf(const char* fmt, va_list ap) {
data/mozjs78-78.4.0/js/src/vm/Printer.cpp:235:12:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  bool r = vprintf(format, ap);
data/mozjs78-78.4.0/js/src/vm/Printer.h:47:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  bool printf(const char* fmt, ...) MOZ_FORMAT_PRINTF(2, 3);
data/mozjs78-78.4.0/js/src/vm/Printer.h:48:8:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  bool vprintf(const char* fmt, va_list ap) MOZ_FORMAT_PRINTF(2, 0);
data/mozjs78-78.4.0/js/src/vm/Runtime.h:765:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const JS::Zone* atomsZone(const js::AutoAccessAtomsZone& access) const {
data/mozjs78-78.4.0/js/src/vm/Runtime.h:768:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  JS::Zone* atomsZone(const js::AutoAccessAtomsZone& access) {
data/mozjs78-78.4.0/js/src/vm/SymbolType.cpp:92:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    out.printf(code_ == SymbolCode::InSymbolRegistry ? "Symbol.for("
data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.cpp:82:33:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  char* rest = filename.get() + sprintf(filename.get(), "%s/", outdir);
data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.cpp:85:13:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int ret = vsnprintf(rest, len, pattern, ap);
data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.cpp:168:17:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      written = fprintf(out, R"(, "threadName":"%s")", threadName);
data/mozjs78-78.4.0/js/src/vm/TypeInference.cpp:242:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, fmt, ap);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6407:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void bceCheckLocal(MemoryAccessDesc* access, AccessCheck* check,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6432:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void prepareMemoryAccess(MemoryAccessDesc* access, AccessCheck* check,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6488:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BaseIndex prepareAtomicMemoryAccess(MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6492:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    prepareMemoryAccess(access, check, tls, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6499:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Address prepareAtomicMemoryAccess(MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6503:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    prepareMemoryAccess(access, check, tls, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6508:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Address prepareAtomicMemoryAccess(MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6515:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void needLoadTemps(const MemoryAccessDesc& access, RegI32* temp1,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6518:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (IsUnaligned(access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6519:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      switch (access.type()) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6547:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_MUST_USE bool load(MemoryAccessDesc* access, AccessCheck* check,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6550:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    prepareMemoryAccess(access, check, tls, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6556:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmLoadI64(*access, srcAddr, dest.i64());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6558:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmLoad(*access, srcAddr, dest.any());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6566:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmLoadI64(*access, srcAddr, dest.i64());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6570:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmLoad(*access, srcAddr, dest.any());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6574:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (IsUnaligned(*access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6577:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedLoadI64(*access, HeapReg, ptr, ptr, dest.i64(),
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6581:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedLoadFP(*access, HeapReg, ptr, ptr, dest.f32(),
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6585:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedLoadFP(*access, HeapReg, ptr, ptr, dest.f64(),
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6589:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedLoad(*access, HeapReg, ptr, ptr, dest.i32(), temp1);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6596:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmLoadI64(*access, HeapReg, ptr, ptr, dest.i64());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6598:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmLoad(*access, HeapReg, ptr, ptr, dest.any());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6603:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmLoadI64(*access, HeapReg, ptr, ptr, dest.i64());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6605:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmLoad(*access, HeapReg, ptr, ptr, dest.any());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6614:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  RegI32 needStoreTemp(const MemoryAccessDesc& access, ValType srcType) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6616:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (IsUnaligned(access) && srcType != ValType::I32) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6627:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_MUST_USE bool store(MemoryAccessDesc* access, AccessCheck* check,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6629:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    prepareMemoryAccess(access, check, tls, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6636:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmStore(*access, src.any(), dstAddr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6643:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmStoreI64(*access, src.i64(), dstAddr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6661:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmStore(*access, value, dstAddr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6664:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (IsUnaligned(*access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6667:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedStoreI64(*access, src.i64(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6671:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedStoreFP(*access, src.f32(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6675:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedStoreFP(*access, src.f64(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6680:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedStore(*access, src.i32(), HeapReg, ptr, ptr, temp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6688:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmStoreI64(*access, src.i64(), HeapReg, ptr, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6690:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmStore(*access, AnyRegister(src.i64().low), HeapReg, ptr, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6692:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmStore(*access, src.any(), HeapReg, ptr, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6696:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (IsUnaligned(*access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6699:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedStoreI64(*access, src.i64(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6703:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedStoreFP(*access, src.f32(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6707:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedStoreFP(*access, src.f64(), HeapReg, ptr, ptr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6711:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmUnalignedStore(*access, src.i32(), HeapReg, ptr, ptr, temp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6718:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmStoreI64(*access, src.i64(), HeapReg, ptr, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6720:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmStore(*access, src.any(), HeapReg, ptr, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6726:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmStoreI64(*access, src.i64(), HeapReg, ptr, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6728:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      masm.wasmStore(*access, src.any(), HeapReg, ptr, ptr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6760:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void atomicRMW32(const MemoryAccessDesc& access, T srcAddr, AtomicOp op,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6762:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access.type()) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6773:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmAtomicFetchOp(access, op, rv, srcAddr, temp, rd);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6781:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmAtomicFetchOp(access, op, rv, srcAddr, temps[0], temps[1],
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6784:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmAtomicFetchOp(access, op, rv, srcAddr, temps[0], rd);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6796:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void atomicRMW64(const MemoryAccessDesc& access, const T& srcAddr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6798:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    masm.wasmAtomicFetchOp64(access, op, value, srcAddr, temp, rd);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6808:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void atomicCmpXchg32(const MemoryAccessDesc& access, T srcAddr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6811:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access.type()) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6822:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmCompareExchange(access, srcAddr, rexpect, rnew, rd);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6830:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmCompareExchange(access, srcAddr, rexpect, rnew, temps[0],
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6833:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmCompareExchange(access, srcAddr, rexpect, rnew, rd);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6848:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void atomicXchg32(const MemoryAccessDesc& access, T srcAddr, RegI32 rv,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6850:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access.type()) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6857:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmAtomicExchange(access, srcAddr, rv, scratch);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6860:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          masm.wasmAtomicExchange(access, srcAddr, rv, rd);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6869:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmAtomicExchange(access, srcAddr, rv, temps[0], temps[1],
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:6872:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        masm.wasmAtomicExchange(access, srcAddr, rv, rd);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7107:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicCmpXchg32(const MemoryAccessDesc& access, T srcAddr) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7108:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->atomicCmpXchg32(access, srcAddr, rexpect, rnew, getRd(), temps);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7172:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicCmpXchg64(const MemoryAccessDesc& access, T srcAddr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7176:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->masm.wasmCompareExchange64(access, srcAddr, rexpect,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7181:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicCmpXchg64(const MemoryAccessDesc& access, T srcAddr) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7182:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->masm.wasmCompareExchange64(access, srcAddr, rexpect, rnew, getRd());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7218:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicLoad64(const MemoryAccessDesc& access, T srcAddr, RegI32 ebx) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7220:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->masm.wasmAtomicLoad64(access, srcAddr, bc->specific_.ecx_ebx,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7225:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicLoad64(const MemoryAccessDesc& access, T srcAddr) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7226:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->masm.wasmAtomicLoad64(access, srcAddr, RegI64::Invalid(), getRd());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7317:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicRMW32(const MemoryAccessDesc& access, T srcAddr, AtomicOp op) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7318:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->atomicRMW32(access, srcAddr, op, rv, getRd(), temps);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7399:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicRMW64(const MemoryAccessDesc& access, T srcAddr, AtomicOp op,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7402:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->atomicRMW64(access, srcAddr, op, value, bc->specific_.ecx_ebx,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7407:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicRMW64(const MemoryAccessDesc& access, T srcAddr, AtomicOp op) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7408:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->atomicRMW64(access, srcAddr, op, rv, temp, getRd());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7459:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicXchg32(const MemoryAccessDesc& access, T srcAddr) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7460:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->atomicXchg32(access, srcAddr, rv, getRd(), temps);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7516:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicXchg64(const MemoryAccessDesc& access, T srcAddr,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7520:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->masm.wasmAtomicExchange64(access, srcAddr, bc->specific_.ecx_ebx,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7525:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void atomicXchg64(const MemoryAccessDesc& access, T srcAddr) const {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7526:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bc->masm.wasmAtomicExchange64(access, srcAddr, rv, getRd());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7611:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  RegI32 popMemoryAccess(MemoryAccessDesc* access, AccessCheck* check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7911:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_MUST_USE bool loadCommon(MemoryAccessDesc* access, AccessCheck check,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:7914:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MOZ_MUST_USE bool storeCommon(MemoryAccessDesc* access, AccessCheck check,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:8066:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void emitAtomicXchg64(MemoryAccessDesc* access, WantResult wantResult);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10791:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
RegI32 BaseCompiler::popMemoryAccess(MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10823:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    bceCheckLocal(access, check, local);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10867:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
bool BaseCompiler::loadCommon(MemoryAccessDesc* access, AccessCheck check,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10870:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  needLoadTemps(*access, &temp1, &temp2, &temp3);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10874:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10876:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rv = IsUnaligned(*access) ? needI32() : rp;
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10881:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!load(access, &check, tls, rp, AnyReg(rv), temp1, temp2, temp3)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10896:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10898:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10902:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!load(access, &check, tls, rp, AnyReg(rv), temp1, temp2, temp3)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10910:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10913:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!load(access, &check, tls, rp, AnyReg(rv), temp1, temp2, temp3)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10921:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10924:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!load(access, &check, tls, rp, AnyReg(rv), temp1, temp2, temp3)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10933:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10936:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!load(access, &check, tls, rp, AnyReg(rv), temp1, temp2, temp3)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10967:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10968:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return loadCommon(&access, AccessCheck(), type);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10971:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
bool BaseCompiler::storeCommon(MemoryAccessDesc* access, AccessCheck check,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10974:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  RegI32 temp = needStoreTemp(*access, resultType);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10979:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10981:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!store(access, &check, tls, rp, AnyReg(rv), temp)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10990:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:10992:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!store(access, &check, tls, rp, AnyReg(rv), temp)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11001:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11003:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!store(access, &check, tls, rp, AnyReg(rv), temp)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11012:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11014:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!store(access, &check, tls, rp, AnyReg(rv), temp)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11024:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11026:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!store(access, &check, tls, rp, AnyReg(rv), temp)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11057:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11058:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return storeCommon(&access, AccessCheck(), resultType);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11415:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11422:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    RegI32 rp = popMemoryAccess(&access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11425:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    auto memaddr = prepareAtomicMemoryAccess(&access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11426:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    regs.atomicCmpXchg32(access, memaddr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11445:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  RegI32 rp = popMemoryAccess(&access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11450:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto memaddr = prepareAtomicMemoryAccess(&access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11451:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  regs.atomicCmpXchg64(access, memaddr, ebx);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11454:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto memaddr = prepareAtomicMemoryAccess(&access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11455:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  regs.atomicCmpXchg64(access, memaddr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11475:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11479:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return loadCommon(&access, AccessCheck(), type);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11490:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  RegI32 rp = popMemoryAccess(&access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11495:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto memaddr = prepareAtomicMemoryAccess(&access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11496:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  regs.atomicLoad64(access, memaddr, ebx);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11499:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto memaddr = prepareAtomicMemoryAccess(&access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11500:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  regs.atomicLoad64(access, memaddr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11524:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11531:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    RegI32 rp = popMemoryAccess(&access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11534:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    auto memaddr = prepareAtomicMemoryAccess(&access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11535:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    regs.atomicRMW32(access, memaddr, op);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11553:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  RegI32 rp = popMemoryAccess(&access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11563:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto memaddr = prepareAtomicMemoryAccess(&access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11564:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  regs.atomicRMW64(access, memaddr, op, value, ebx);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11569:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto memaddr = prepareAtomicMemoryAccess(&access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11570:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  regs.atomicRMW64(access, memaddr, op);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11592:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11596:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return storeCommon(&access, AccessCheck(), type);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11604:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  emitAtomicXchg64(&access, WantResult(false));
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11622:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11627:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    RegI32 rp = popMemoryAccess(&access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11630:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    auto memaddr = prepareAtomicMemoryAccess(&access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11631:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    regs.atomicXchg32(access, memaddr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11646:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  emitAtomicXchg64(&access, WantResult(true));
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11650:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void BaseCompiler::emitAtomicXchg64(MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11655:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  RegI32 rp = popMemoryAccess(access, &check);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11660:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto memaddr = prepareAtomicMemoryAccess(access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11661:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  regs.atomicXchg64(*access, memaddr, ebx);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11664:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto memaddr = prepareAtomicMemoryAccess(access, &check, tls, rp);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11665:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  regs.atomicXchg64(*access, memaddr);
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11820:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Int64, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11823:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!loadCommon(&access, check, ValType::I64)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11837:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint32, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11840:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!loadCommon(&access, check, ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11853:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint16, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11856:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!loadCommon(&access, check, ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11869:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint8, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11872:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!loadCommon(&access, check, ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11892:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint8, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11894:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!storeCommon(&access, check, ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11910:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint16, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11913:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!storeCommon(&access, check, ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11929:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint32, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11932:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!storeCommon(&access, check, ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11949:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Int64, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:11952:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!storeCommon(&access, check, ValType::I64)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:12100:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint8, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:12102:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!storeCommon(&access, check, ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:12117:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint16, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:12120:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!storeCommon(&access, check, ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:12135:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint32, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:12138:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!storeCommon(&access, check, ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:12154:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Int64, 1, offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:12157:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!storeCommon(&access, check, ValType::I64)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:13331:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:13334:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!loadCommon(&access, AccessCheck(), ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:13340:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!loadCommon(&access, AccessCheck(), ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:13346:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!loadCommon(&access, AccessCheck(), ValType::I32)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:13352:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!loadCommon(&access, AccessCheck(), ValType::I64)) {
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:13373:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(Scalar::Int64, addr.align, addr.offset,
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:13375:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!loadCommon(&access, AccessCheck(), ValType::I64)) {
data/mozjs78-78.4.0/js/src/wasm/WasmCode.cpp:1474:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  for (auto& access : masm.symbolicAccesses()) {
data/mozjs78-78.4.0/js/src/wasm/WasmCode.cpp:1475:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access.target) {
data/mozjs78-78.4.0/js/src/wasm/WasmCode.cpp:1486:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void* target = AddressOf(access.target, &abiType);
data/mozjs78-78.4.0/js/src/wasm/WasmCode.cpp:1487:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    uint8_t* patchAt = codeBase + access.patchAt.offset();
data/mozjs78-78.4.0/js/src/wasm/WasmGenerator.cpp:703:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  for (const SymbolicAccess& access : code.symbolicAccesses) {
data/mozjs78-78.4.0/js/src/wasm/WasmGenerator.cpp:704:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    uint32_t patchAt = offsetInModule + access.patchAt.offset();
data/mozjs78-78.4.0/js/src/wasm/WasmGenerator.cpp:705:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!linkData_->symbolicLinks[access.target].append(patchAt)) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:756:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(viewType, addr.align, addr.offset,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:760:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    auto* scalar = load(addr.base, &access, resultType);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:769:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Int64, addr.align, addr.offset,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:772:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    auto* scalar = load(addr.base, &access, ValType::I64);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:822:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  bool needAlignmentCheck(MemoryAccessDesc* access, MDefinition* base,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:843:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void checkOffsetAndAlignmentAndBounds(MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:865:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    bool alignmentCheck = needAlignmentCheck(access, *base, &mustAdd);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:874:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      *base = computeEffectiveAddress(*base, access);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:893:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  bool isSmallerAccessForI64(ValType result, const MemoryAccessDesc* access) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:904:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                       MemoryAccessDesc* access) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:918:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MDefinition* load(MDefinition* base, MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:932:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      checkOffsetAndAlignmentAndBounds(access, &base);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:934:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          MWasmLoad::New(alloc(), memoryBase, base, *access, ToMIRType(result));
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:943:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void store(MDefinition* base, MemoryAccessDesc* access, MDefinition* v) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:956:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      checkOffsetAndAlignmentAndBounds(access, &base);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:957:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      store = MWasmStore::New(alloc(), memoryBase, base, *access, v);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:966:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                         MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:973:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    checkOffsetAndAlignmentAndBounds(access, &base);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:975:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (isSmallerAccessForI64(result, access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:990:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                      base, *access, oldv, newv, tlsPointer_);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:996:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (isSmallerAccessForI64(result, access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1004:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MDefinition* atomicExchangeHeap(MDefinition* base, MemoryAccessDesc* access,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1010:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    checkOffsetAndAlignmentAndBounds(access, &base);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1012:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (isSmallerAccessForI64(result, access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1022:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                     base, *access, value, tlsPointer_);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1028:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (isSmallerAccessForI64(result, access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1037:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                               MemoryAccessDesc* access, ValType result,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1043:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    checkOffsetAndAlignmentAndBounds(access, &base);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1045:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (isSmallerAccessForI64(result, access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1055:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                  base, *access, value, tlsPointer_);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:1061:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (isSmallerAccessForI64(result, access)) {
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:2902:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:2904:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto* ins = f.load(addr.base, &access, type);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:2922:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:2925:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  f.store(addr.base, &access, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:2938:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:2941:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  f.store(addr.base, &access, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:2962:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:2965:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  f.store(addr.base, &access, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3123:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, f.bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3126:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      f.atomicCompareExchangeHeap(addr.base, &access, type, oldValue, newValue);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3142:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, f.bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3144:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto* ins = f.load(addr.base, &access, type);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3161:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, f.bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3163:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto* ins = f.atomicBinopHeap(op, addr.base, &access, type, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3180:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, f.bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3182:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  f.store(addr.base, &access, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3206:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(type == ValType::I32 ? Scalar::Int32 : Scalar::Int64,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3208:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MDefinition* ptr = f.computeEffectiveAddress(addr.base, &access);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3263:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(Scalar::Int32, addr.align, addr.offset,
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3265:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MDefinition* ptr = f.computeEffectiveAddress(addr.base, &access);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3299:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemoryAccessDesc access(viewType, addr.align, addr.offset, f.bytecodeOffset(),
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3301:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MDefinition* ins = f.atomicExchangeHeap(addr.base, &access, type, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3369:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Int64, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3370:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    auto* load = f.load(src, &access, ValType::I64);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3380:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint32, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3381:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    auto* load = f.load(src, &access, ValType::I32);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3390:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint16, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3391:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    auto* load = f.load(src, &access, ValType::I32);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3400:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint8, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3401:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    auto* load = f.load(src, &access, ValType::I32);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3415:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint8, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3417:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    f.store(dst, &access, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3423:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint16, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3425:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    f.store(dst, &access, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3431:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint32, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3433:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    f.store(dst, &access, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3440:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Int64, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3442:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    f.store(dst, &access, value);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3652:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint8, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3653:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    f.store(start, &access, val);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3659:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint16, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3660:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    f.store(start, &access, val2);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3666:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Uint32, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3667:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    f.store(start, &access, val4);
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3674:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemoryAccessDesc access(Scalar::Int64, 1, offset, f.bytecodeOffset());
data/mozjs78-78.4.0/js/src/wasm/WasmIonCompile.cpp:3675:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    f.store(start, &access, val8);
data/mozjs78-78.4.0/js/src/wasm/WasmModule.cpp:1175:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(buf, format, fieldNo);
data/mozjs78-78.4.0/js/src/wasm/WasmTypes.cpp:995:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, fmt, ap);
data/mozjs78-78.4.0/js/src/zydis/Zycore/Defines.h:278:23:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        [[gnu::format(printf, format_index, first_to_check)]]
data/mozjs78-78.4.0/js/src/zydis/Zycore/Defines.h:281:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        __attribute__((format(printf, format_index, first_to_check)))
data/mozjs78-78.4.0/js/src/zydis/Zycore/Defines.h:294:25:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        [[rscpp::format(wprintf, format_index, first_to_check)]]
data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h:78:25:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define ZYAN_FPRINTF    fprintf
data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h:79:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define ZYAN_PRINTF     printf
data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h:82:25:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#define ZYAN_SCANF      scanf
data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h:83:25:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#define ZYAN_SSCANF     sscanf
data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h:84:25:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define ZYAN_VSNPRINTF  vsnprintf
data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h:115:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
#define ZYAN_STRCAT     strcat
data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h:119:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define ZYAN_STRCPY     strcpy
data/mozjs78-78.4.0/js/src/zydis/Zydis/SharedData.c:51:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#define ZYDIS_OPERAND_DEFINITION(type, encoding, access) \
data/mozjs78-78.4.0/js/src/zydis/Zydis/SharedData.c:52:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    { type, encoding, access }
data/mozjs78-78.4.0/js/src/zydis/ZydisAPI.cpp:65:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buffer+strlen(buffer), "%s%02x", i == 0 ? "" : " ", *(code + offset + i));
data/mozjs78-78.4.0/memory/build/mozmemory_wrap.cpp:57:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ret = vsnprintf(ptr, 128, fmt, ap);
data/mozjs78-78.4.0/mfbt/Assertions.cpp:38:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      vsnprintf(sPrintfCrashReason, sPrintfCrashReasonSize, aFormat, aArgs);
data/mozjs78-78.4.0/mfbt/Attributes.h:912:27:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    __attribute__((format(printf, stringIndex, firstToCheck)))
data/mozjs78-78.4.0/mfbt/Sprintf.h:24:16:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int result = vsnprintf(buffer, N, format, args);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:442:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                    fprintf(stderr, __FILE__ ": ");           \
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:443:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                    fprintf(stderr, __VA_ARGS__);             \
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:118:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                    fprintf(stderr, __FILE__ ": ");           \
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:119:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                    fprintf(stderr, __VA_ARGS__);             \
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:575:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("-17", "%" SCNd8, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:580:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("042", "%" SCNi8, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:590:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("-1742", "%" SCNd16, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:595:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("04217", "%" SCNi16, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:604:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("-174257", "%" SCNd32, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:609:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("0423571", "%" SCNi32, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:618:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("-17425238927232", "%" SCNd64, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:623:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("042333576571", "%" SCNi64, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:640:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("-17", "%" SCNdLEAST8, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:645:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("042", "%" SCNiLEAST8, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:655:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("-1742", "%" SCNdLEAST16, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:660:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("04217", "%" SCNiLEAST16, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:669:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("-174257", "%" SCNdLEAST32, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:674:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("0423571", "%" SCNiLEAST32, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:683:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("-17425238927232", "%" SCNdLEAST64, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:688:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("042333576571", "%" SCNiLEAST64, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:705:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("-17", "%" SCNdFAST8, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:710:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("042", "%" SCNiFAST8, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:720:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("-1742", "%" SCNdFAST16, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:725:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("04217", "%" SCNiFAST16, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:734:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("-174257", "%" SCNdFAST32, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:739:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("0423571", "%" SCNiFAST32, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:748:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("-17425238927232", "%" SCNdFAST64, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:753:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("042333576571", "%" SCNiFAST64, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:769:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("-432157943248732", "%" SCNdMAX, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:774:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("04233357236571", "%" SCNiMAX, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:783:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("12345678", "%" SCNdPTR, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:788:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("04233357236", "%" SCNiPTR, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:816:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("17", "%" SCNo8, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:821:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("42", "%" SCNu8, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:826:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("2A", "%" SCNx8, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:836:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("1742", "%" SCNo16, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:841:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("4217", "%" SCNu16, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:846:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("2ABC", "%" SCNx16, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:855:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("17421742", "%" SCNo32, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:860:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("4217867", "%" SCNu32, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:865:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("2ABCBEEF", "%" SCNx32, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:874:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("17421742173", "%" SCNo64, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:879:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("421786713579", "%" SCNu64, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:884:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("DEADBEEF7457E", "%" SCNx64, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:901:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("17", "%" SCNoLEAST8, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:906:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("42", "%" SCNuLEAST8, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:911:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("2A", "%" SCNxLEAST8, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:921:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("1742", "%" SCNoLEAST16, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:926:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("4217", "%" SCNuLEAST16, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:931:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("2ABC", "%" SCNxLEAST16, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:940:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("17421742", "%" SCNoLEAST32, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:945:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("4217867", "%" SCNuLEAST32, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:950:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("2ABCBEEF", "%" SCNxLEAST32, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:959:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("17421742173", "%" SCNoLEAST64, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:964:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("421786713579", "%" SCNuLEAST64, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:969:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("DEADBEEF7457E", "%" SCNxLEAST64, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:986:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("17", "%" SCNoFAST8, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:991:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("42", "%" SCNuFAST8, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:996:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("2A", "%" SCNxFAST8, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:1006:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("1742", "%" SCNoFAST16, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:1011:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("4217", "%" SCNuFAST16, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:1016:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("2ABC", "%" SCNxFAST16, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:1025:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("17421742", "%" SCNoFAST32, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:1030:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("4217867", "%" SCNuFAST32, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:1035:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("2ABCBEEF", "%" SCNxFAST32, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:1044:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("17421742173", "%" SCNoFAST64, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:1049:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("421786713579", "%" SCNuFAST64, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:1054:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("DEADBEEF7457E", "%" SCNxFAST64, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:1070:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("14220563454333534", "%" SCNoMAX, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:1075:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("432157943248732", "%" SCNuMAX, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:1080:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("4c337ca791", "%" SCNxMAX, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:1089:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("57060516", "%" SCNoPTR, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:1094:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("87654321", "%" SCNuPTR, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:1099:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf("4c3a791", "%" SCNxPTR, &u.mI);
data/mozjs78-78.4.0/mfbt/tests/TestJSONWriter.cpp:35:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(mPtr, "%s", aStr);
data/mozjs78-78.4.0/modules/zlib/src/gzguts.h:86:18:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#    if !defined(vsnprintf) && !defined(NO_vsnprintf)
data/mozjs78-78.4.0/modules/zlib/src/gzguts.h:88:18:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#         define vsnprintf _vsnprintf
data/mozjs78-78.4.0/modules/zlib/src/gzguts.h:110:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define snprintf _snprintf
data/mozjs78-78.4.0/modules/zlib/src/gzguts.h:110:20:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define snprintf _snprintf
data/mozjs78-78.4.0/modules/zlib/src/gzlib.c:216:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(state->path, path);
data/mozjs78-78.4.0/modules/zlib/src/gzlib.c:614:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(state->msg, state->path);
data/mozjs78-78.4.0/modules/zlib/src/gzlib.c:616:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(state->msg, msg);
data/mozjs78-78.4.0/modules/zlib/src/gzwrite.c:417:11:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    (void)vsprintf(next, format, va);
data/mozjs78-78.4.0/modules/zlib/src/gzwrite.c:421:11:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = vsprintf(next, format, va);
data/mozjs78-78.4.0/modules/zlib/src/gzwrite.c:425:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    (void)vsnprintf(next, state->size, format, va);
data/mozjs78-78.4.0/modules/zlib/src/gzwrite.c:428:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = vsnprintf(next, state->size, format, va);
data/mozjs78-78.4.0/modules/zlib/src/gzwrite.c:511:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(next, format, a1, a2, a3, a4, a5, a6, a7, a8, a9, a10, a11, a12,
data/mozjs78-78.4.0/modules/zlib/src/gzwrite.c:517:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = sprintf(next, format, a1, a2, a3, a4, a5, a6, a7, a8, a9, a10, a11,
data/mozjs78-78.4.0/modules/zlib/src/gzwrite.c:522:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(next, state->size, format, a1, a2, a3, a4, a5, a6, a7, a8, a9,
data/mozjs78-78.4.0/modules/zlib/src/gzwrite.c:526:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = snprintf(next, state->size, format, a1, a2, a3, a4, a5, a6, a7, a8,
data/mozjs78-78.4.0/modules/zlib/src/zutil.h:242:39:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Trace(x) {if (z_verbose>=0) fprintf x ;}
data/mozjs78-78.4.0/modules/zlib/src/zutil.h:243:39:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracev(x) {if (z_verbose>0) fprintf x ;}
data/mozjs78-78.4.0/modules/zlib/src/zutil.h:244:40:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracevv(x) {if (z_verbose>1) fprintf x ;}
data/mozjs78-78.4.0/modules/zlib/src/zutil.h:245:48:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracec(c,x) {if (z_verbose>0 && (c)) fprintf x ;}
data/mozjs78-78.4.0/modules/zlib/src/zutil.h:246:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracecv(c,x) {if (z_verbose>1 && (c)) fprintf x ;}
data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.cpp:170:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, aFmt, args);
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulCommonExt.h:444:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buf, " %ld %c%s", labs(offset_), offset_ < 0 ? '-' : '+',
data/mozjs78-78.4.0/mozglue/misc/Debug.h:53:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(fp, fmt, args);
data/mozjs78-78.4.0/mozglue/misc/Printf.cpp:328:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  len = snprintf(buf.get(), buf_size, fin, d);
data/mozjs78-78.4.0/nsprpub/config/libc_r.h:81:5:  [4] (crypto) crypt_r:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
    crypt_r(pass,salt,&r_cryptd_r)
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:230:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(toname, "%s/%s", todir, base);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:254:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(linkname, "%s/%s", linkprefix, name);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:262:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(linkname + lplen, name);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:301:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            if (exists && (!S_ISREG(tosb.st_mode) || access(toname, W_OK) < 0)) {
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:381:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, format, ap);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:468:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    return strcpy((char*)xmalloc(strlen(s) + 1), s);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:510:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        len = strlen(strcpy(outpath, to));
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:522:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(outpath + len, "%s/", buf);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:536:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    cp = strcpy(outpath + PATH_MAX - (len + 1), name);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:549:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(cp, name);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:559:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(outpath, cp);
data/mozjs78-78.4.0/nsprpub/lib/libc/src/strcat.c:16:12:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    return strcat(dest, src);
data/mozjs78-78.4.0/nsprpub/lib/libc/src/strcpy.c:16:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    return strcpy(dest, src);
data/mozjs78-78.4.0/nsprpub/lib/prstreams/tests/testprstrm/testprstrm.cpp:49:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(fname1, arg->mytag);
data/mozjs78-78.4.0/nsprpub/lib/prstreams/tests/testprstrm/testprstrm.cpp:50:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(fname2, arg->mytag);
data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/ranfile.cpp:174:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void)sprintf(filename, "%ssg%04p.dat", baseName, this);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prlayer.c:629:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(name, layer_name);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prprf.c:22:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/mozjs78-78.4.0/nsprpub/pr/src/io/prprf.c:22:18:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/mozjs78-78.4.0/nsprpub/pr/src/io/prprf.c:341:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(fout, sizeof(fout), fin, d);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:286:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(p, ev);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:1289:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(result, dli.dli_fname);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:1302:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(result, image_name);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:1357:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(result, infop->ldinfo_filename);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:1378:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(result, desc.filename);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:1395:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(result, desc.filename);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:1421:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(result, module_name);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:1474:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(result, module_name);
data/mozjs78-78.4.0/nsprpub/pr/src/malloc/prmalloc.c:60:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define TRACE(foo)    printf  foo
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c:165:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access |= OPEN_FLAGS_WRITE_THROUGH;
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c:169:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access |= OPEN_ACCESS_READONLY;
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c:172:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access |= OPEN_ACCESS_WRITEONLY;
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c:175:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access |= OPEN_ACCESS_READWRITE;
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c:210:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            access,           /* Open mode and rights      */
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c:221:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                         access,           /* Open mode and rights      */
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c:590:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(newfn, fn);
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c:770:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            rv = access(name, 02);
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c:773:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            rv = access(name, 04);
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c:776:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            return access(name, 00);
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:122:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(*cmdLine, *arg);
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:301:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(pszEXEName, pszComSpec);
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:333:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(pszFormatResult, pszFormatString, path, cmdLine);
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:336:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pszEXEName, path);
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:377:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(pszCmdLine, "%s%c%s%c", pszEXEName, '\0',
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:211:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (0 == access(to, F_OK)) {
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:248:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    rv = access(name, amode);
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxproces.c:318:19:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
            (void)execv(path, argv);
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxshm.c:78:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( shm->ipcname, ipcname );
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxshm.c:316:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( shm->ipcname, ipcname );
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c:2128:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access |= GENERIC_READ;
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c:2131:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access |= GENERIC_WRITE;
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c:2151:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                      access,
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c:2190:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access |= GENERIC_READ;
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c:2193:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access |= GENERIC_WRITE;
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c:2222:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                      access,
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c:2835:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(filename, name);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c:2985:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(newfn, fn);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w32shm.c:73:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( shm->ipcname, ipcname );
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w32shm.c:182:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                          access,
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:156:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access |= GENERIC_READ;
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:159:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access |= GENERIC_WRITE;
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:182:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                       access,
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:223:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access |= GENERIC_READ;
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:226:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access |= GENERIC_WRITE;
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:249:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                       access,
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:483:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(filename, name);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:633:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(newfn, fn);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:1092:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access |= GENERIC_READ;
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:1095:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access |= GENERIC_WRITE;
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:1118:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                       access,
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:1147:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(filename, name);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/dtoa.c:1840:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy((char*)decimalpoint_cache, (CONST char*)s0);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/pratom.c:320:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(stack->prstk_name, stack_name);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prcountr.c:163:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy( qnp->name, qName );
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prcountr.c:185:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( rnp->name, rName );
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prcountr.c:186:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( rnp->desc, description );
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prerrortable.c:126:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(buffer, error_table_name (table_num));
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prinit.c:534:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(attr->currentDirectory, dir);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/pripc.c:87:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(result, name);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prtrace.c:240:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy( qnp->name, qName );
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prtrace.c:262:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( rnp->name, rName );
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prtrace.c:263:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( rnp->desc, description );
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptio.c:3897:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            rv =  access(name, R_OK);
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptio.c:3900:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            rv = access(name, W_OK);
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptio.c:3904:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            rv = access(name, F_OK);
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptio.c:3948:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    rv = access(to, F_OK);
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptthread.c:53:13:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    PRInt32 system, user;       /* a count of the two different types */
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptthread.c:1163:26:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        if (0 == pt_book.system)
data/mozjs78-78.4.0/nsprpub/pr/src/threads/prrwlock.c:120:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(rwlock->rw_name, lock_name);
data/mozjs78-78.4.0/nsprpub/pr/tests/anonfm.c:291:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(dirName, opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/bigfile2.c:51:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, MESSAGE);
data/mozjs78-78.4.0/nsprpub/pr/tests/bigfile3.c:53:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, MESSAGE);
data/mozjs78-78.4.0/nsprpub/pr/tests/cltsrv.c:178:45:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        if (debug_mode || (p <= verbosity)) printf a; \
data/mozjs78-78.4.0/nsprpub/pr/tests/cvar2.c:33:37:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DPRINTF(arg) if (_debug_on) printf arg
data/mozjs78-78.4.0/nsprpub/pr/tests/env.c:123:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf( envBuf, ENVNAME "=" ENVVALUE );
data/mozjs78-78.4.0/nsprpub/pr/tests/env.c:268:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf( envBuf, ENVNAME );
data/mozjs78-78.4.0/nsprpub/pr/tests/env.c:296:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf( envBuf, ENVNAME "=" ENVVALUE );
data/mozjs78-78.4.0/nsprpub/pr/tests/env.c:311:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf( envBuf, ENVNAME "=" );
data/mozjs78-78.4.0/nsprpub/pr/tests/env.c:338:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf( envBuf, ENVNAME "999=" );
data/mozjs78-78.4.0/nsprpub/pr/tests/mbcs.c:76:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( file, "%s/%s", dir, dirEntry->name );
data/mozjs78-78.4.0/nsprpub/pr/tests/mbcs.c:96:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf( nextDir, "%s/%s", dir, dirEntry->name );
data/mozjs78-78.4.0/nsprpub/pr/tests/nameshm1.c:553:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy( optName, opt->value );
data/mozjs78-78.4.0/nsprpub/pr/tests/nbconn.c:43:37:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DPRINTF(arg) if (_debug_on) printf arg
data/mozjs78-78.4.0/nsprpub/pr/tests/perf.c:14:37:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DPRINTF(arg) if (_debug_on) printf arg
data/mozjs78-78.4.0/nsprpub/pr/tests/provider.c:178:45:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        if (debug_mode || (p <= verbosity)) printf a; \
data/mozjs78-78.4.0/nsprpub/pr/tests/ranfile.c:133:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void)sprintf(filename, "%ssg%04ld.dat", baseName, cd->id);
data/mozjs78-78.4.0/nsprpub/pr/tests/server_test.c:62:17:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DPRINTF printf
data/mozjs78-78.4.0/nsprpub/pr/tests/servr_kk.c:58:17:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DPRINTF printf
data/mozjs78-78.4.0/nsprpub/pr/tests/servr_ku.c:58:17:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DPRINTF printf
data/mozjs78-78.4.0/nsprpub/pr/tests/servr_uk.c:58:17:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DPRINTF printf
data/mozjs78-78.4.0/nsprpub/pr/tests/servr_uu.c:58:17:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DPRINTF printf
data/mozjs78-78.4.0/nsprpub/pr/tests/short_thread.c:16:37:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DPRINTF(arg) if (_debug_on) printf arg
data/mozjs78-78.4.0/nsprpub/pr/tests/socket.c:41:37:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DPRINTF(arg) if (_debug_on) printf arg
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:45:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(sbuf, pattern, i);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:96:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                    strcat(fmt, signs[s]);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:99:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                    strcat(fmt, precs[p]);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:102:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                    strcat(fmt, formats[f]);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:129:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(sbuf, spattern, l);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:194:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                    strcat(fmt, signs[s]);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:197:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                    strcat(fmt, precs[p]);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:199:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(sfmt, fmt);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:201:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                    strcat(fmt, formats[f]);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:204:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                    strcat(sfmt, sformats[f]);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:232:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(sbuf, spattern, l);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:336:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                    strcat(fmt, signs[s]);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:339:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                    strcat(fmt, precs[p]);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:341:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(sfmt, fmt);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:343:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                    strcat(fmt, formats[f]);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:346:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                    strcat(sfmt, sformats[f]);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:378:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(sbuf, pattern, ss);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:432:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                    strcat(fmt+strlen(fmt), signs[s]);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:435:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                    strcat(fmt+strlen(fmt), precs[p]);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:438:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                    strcat(fmt+strlen(fmt), formats[f]);
data/mozjs78-78.4.0/nsprpub/pr/tests/testbit.c:14:26:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define ErrorReport(x) { printf((x)); failed = 1; }
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:37:37:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DPRINTF(arg) if (_debug_on) printf arg
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:375:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tmpname,pathname);
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:428:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(pathname, TEST_DIR);
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:430:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(pathname, FILE_NAME);
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:627:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pathname, TEST_DIR);
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:629:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(pathname, FILE_NAME);
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:634:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(pathname + path_len,"%d%s",i,"");
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:652:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pathname, TEST_DIR);
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:654:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(pathname, HIDDEN_FILE_NAME);
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:740:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pathname, TEST_DIR);
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:742:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(pathname, dirEntry->name);
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:795:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pathname, TEST_DIR);
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:797:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(pathname, HIDDEN_FILE_NAME);
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:808:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(renamename, TEST_DIR);
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:851:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pathname, TEST_DIR);
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:853:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(pathname, FILE_NAME);
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:858:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(pathname + path_len,"%d%s",i,"");
data/mozjs78-78.4.0/nsprpub/pr/tests/thrpool_client.c:42:37:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DPRINTF(arg) if (_debug_on) printf arg
data/mozjs78-78.4.0/nsprpub/pr/tests/thrpool_server.c:49:37:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DPRINTF(arg) if (_debug_on) printf arg
data/mozjs78-78.4.0/nsprpub/pr/tests/timetest.c:127:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(timeString, buf);
data/mozjs78-78.4.0/nsprpub/pr/tests/timetest.c:131:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(timeString, buf);
data/mozjs78-78.4.0/nsprpub/pr/tests/udpsrv.c:100:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( mbuf, "ListNetAddr: %s family: %d, port: %d, ip: %8.8X\n",
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_aix.c:105:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(path, "%s/%i/psinfo", procfs_path, pid);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_aix.c:118:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(path, "%s/%i/status", procfs_path, pid);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_aix.c:148:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(path, "%s/%i/psinfo", procfs_path, pid);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_aix.c:398:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(path, "%s/%i/status", procfs_path, pid);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_aix.c:422:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(path, "%s/%i/cred", procfs_path, pid);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_aix.c:625:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(first.name, FIRST_NETINTERFACE);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_aix.c:836:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(id.name, FIRST_DISK);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_bsd.c:204:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(str, "%s", kp.ki_comm);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_bsd.c:206:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(str, "%s", kp.p_comm);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_bsd.c:369:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(str, "%s", kp.ki_comm);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_bsd.c:371:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(str, "%s", kp.p_comm);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_common.c:77:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fullmsg, "(originated from %s)", syscall);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_common.c:81:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fullmsg, "%s (originated from %s)", strerror(errno), syscall);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_common.c:99:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(msg, "No such process (originated from %s)", syscall);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_common.c:116:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(msg, "Access denied (originated from %s)", syscall);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_common.c:150:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(stderr, format, argptr);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_common.c:247:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fullmsg, "(originated from %s)", syscall);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:106:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(path, "%s/%i/psinfo", procfs_path, pid);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:198:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(path, "%s/%i/psinfo", procfs_path, pid);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:273:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(path, "%s/%i/psinfo", procfs_path, pid);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:337:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(path, "%s/%i/status", procfs_path, pid);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:370:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(path, "%s/%i/lpsinfo", procfs_path, pid);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:436:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(path, "%s/%i/cred", procfs_path, pid);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:457:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(path, "%s/%i/usage", procfs_path, pid);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:514:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(path, "%s/%i/lwp/%i/lwpstatus", procfs_path, pid, tid);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:878:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(path, "%s/%i/status", procfs_path, pid);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:882:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(path, "%s/%i/xmap", procfs_path, pid);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_windows.c:803:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    processHandle = psutil_handle_from_pid(pid, access);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_windows.c:980:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    hProcess = psutil_handle_from_pid(pid, access);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_windows.c:1042:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    hProcess = psutil_handle_from_pid(pid, access);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_windows.c:1141:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    hProcess = psutil_handle_from_pid(pid, access);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_windows.c:1381:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    hProcess = psutil_handle_from_pid(pid, access);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/netbsd/socks.c:404:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(laddr, sun_src->sun_path);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/netbsd/socks.c:405:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(raddr, sun_dst->sun_path);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/openbsd/specific.c:54:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fullmsg, "(originated from %s: %s)", syscall, errbuf);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/cpu.c:50:32:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    double idle, kernel, user, system;
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/cpu.c:69:41:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    return Py_BuildValue("(ddd)", user, system, idle);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_info.c:107:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    hProcess = psutil_handle_from_pid(pid, access);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_utils.c:125:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
psutil_handle_from_pid(DWORD pid, DWORD access) {
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_utils.c:133:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    hProcess = OpenProcess(access, FALSE, pid);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/services.c:20:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
psutil_get_service_handler(char *service_name, DWORD scm_access, DWORD access)
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/services.c:30:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    hService = OpenService(sc, service_name, access);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/services.h:11:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    char service_name, DWORD scm_access, DWORD access);
data/mozjs78-78.4.0/third_party/python/pyyaml/ext/_yaml.c:734:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(__PYX_DEFAULT_STRING_ENCODING, default_encoding_c);
data/mozjs78-78.4.0/third_party/python/scandir/_scandir.c:1378:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(result, path_wide);
data/mozjs78-78.4.0/third_party/python/scandir/_scandir.c:1383:9:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
        wcscpy(result + path_len, filename);
data/mozjs78-78.4.0/third_party/python/scandir/_scandir.c:1458:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(result, path_narrow);
data/mozjs78-78.4.0/third_party/python/scandir/_scandir.c:1461:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(result + path_len, filename);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-death-test-internal.h:165:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(\
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-port.h:1609:20:  [4] (buffer) StrNCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
inline const char* StrNCpy(char* dest, const char* src, size_t n) {
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-printers.cc:59:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
# define snprintf _snprintf
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-printers.cc:59:19:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
# define snprintf _snprintf
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-printers.cc:61:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
# define snprintf _snprintf_s
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-printers.cc:63:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
# define snprintf _snprintf
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-printers.cc:63:19:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
# define snprintf _snprintf
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:136:10:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
# define vsnprintf _vsnprintf
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:840:12:  [4] (buffer) StrNCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    posix::StrNCpy(clone, str, length);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:1460:12:  [4] (buffer) StrNCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    posix::StrNCpy(
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:1713:20:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  const int size = vsnprintf(buffer, kBufferSize, format, args);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:1717:20:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  const int size = vsnprintf(buffer, kBufferSize, format, args);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:2634:5:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vprintf(fmt, args);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:2653:3:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vprintf(fmt, args);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:2660:3:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vprintf(fmt, args);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_log.cpp:133:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf(msg, CUBEB_LOG_MESSAGE_MAX_SIZE, fmt, args);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_log.h:18:56:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define PRINTF_FORMAT(fmt, args) __attribute__((format(printf, fmt, args)))
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_sndio.c:21:18:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DPR(...) fprintf(stderr, __VA_ARGS__);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/common.h:87:3:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vprintf(msg, args);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/tools/cubeb-test.cpp:41:3:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vprintf(msg, args);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:536:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(APIENTRYP PFNGLMAPBUFFERPROC) (GLenum target, GLenum access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:556:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void *APIENTRY glMapBuffer (GLenum target, GLenum access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:1199:114:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(APIENTRYP PFNGLMAPBUFFERRANGEPROC) (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:1284:102:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void *APIENTRY glMapBufferRange (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:2144:134:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (APIENTRYP PFNGLBINDIMAGETEXTUREPROC) (GLuint unit, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLenum format);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:2157:122:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void APIENTRY glBindImageTexture (GLuint unit, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLenum format);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:2600:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(APIENTRYP PFNGLMAPNAMEDBUFFERPROC) (GLuint buffer, GLenum access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:2601:119:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(APIENTRYP PFNGLMAPNAMEDBUFFERRANGEPROC) (GLuint buffer, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:2723:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void *APIENTRY glMapNamedBuffer (GLuint buffer, GLenum access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:2724:107:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void *APIENTRY glMapNamedBufferRange (GLuint buffer, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:2910:87:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (APIENTRYP PFNGLMAKEIMAGEHANDLERESIDENTARBPROC) (GLuint64 handle, GLenum access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:2927:75:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void APIENTRY glMakeImageHandleResidentARB (GLuint64 handle, GLenum access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:4744:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(APIENTRYP PFNGLMAPBUFFERARBPROC) (GLenum target, GLenum access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:4756:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void *APIENTRY glMapBufferARB (GLenum target, GLenum access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:6906:77:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(APIENTRYP PFNGLMAPNAMEDBUFFEREXTPROC) (GLuint buffer, GLenum access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:7018:122:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(APIENTRYP PFNGLMAPNAMEDBUFFERRANGEEXTPROC) (GLuint buffer, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:7162:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void *APIENTRY glMapNamedBufferEXT (GLuint buffer, GLenum access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:7274:110:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void *APIENTRY glMapNamedBufferRangeEXT (GLuint buffer, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:8177:138:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (APIENTRYP PFNGLBINDIMAGETEXTUREEXTPROC) (GLuint index, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLint format);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:8180:126:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void APIENTRY glBindImageTextureEXT (GLuint index, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLint format);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:9204:95:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(APIENTRYP PFNGLMAPTEXTURE2DINTELPROC) (GLuint texture, GLint level, GLbitfield access, GLint *stride, GLenum *layout);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:9208:83:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void *APIENTRY glMapTexture2DINTEL (GLuint texture, GLint level, GLbitfield access, GLint *stride, GLenum *layout);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:9497:86:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (APIENTRYP PFNGLMAKEIMAGEHANDLERESIDENTNVPROC) (GLuint64 handle, GLenum access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:9511:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void APIENTRY glMakeImageHandleResidentNV (GLuint64 handle, GLenum access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:10966:79:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (APIENTRYP PFNGLMAKEBUFFERRESIDENTNVPROC) (GLenum target, GLenum access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:10969:84:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (APIENTRYP PFNGLMAKENAMEDBUFFERRESIDENTNVPROC) (GLuint buffer, GLenum access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:10980:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void APIENTRY glMakeBufferResidentNV (GLenum target, GLenum access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:10983:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void APIENTRY glMakeNamedBufferResidentNV (GLuint buffer, GLenum access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:11359:90:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (APIENTRYP PFNGLVDPAUSURFACEACCESSNVPROC) (GLvdpauSurfaceNV surface, GLenum access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/GL/glext.h:11370:78:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void APIENTRY glVDPAUSurfaceAccessNV (GLvdpauSurfaceNV surface, GLenum access);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:933:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
mark_whole_array_access(ir_rvalue *access)
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp-parse.c:1064:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define YYFPRINTF fprintf
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_parser.cpp:1712:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define YYFPRINTF fprintf
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir.cpp:1768:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(this->name_storage, name ? name : "");
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_builder_print_visitor.cpp:168:4:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   vfprintf(f, fmt, ap);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_builder_print_visitor.cpp:178:4:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   vfprintf(f, fmt, ap);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_glsl_visitor.h:90:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		vsnprintf(m_Ptr + m_Size, new_length+1, fmt, args);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_visitor.cpp:500:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf(f, "%" PRIu64, ir->value.u64[i]);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_visitor.cpp:502:25:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	 case GLSL_TYPE_INT64: fprintf(f, "%" PRIi64, ir->value.i64[i]); break;
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniforms.cpp:959:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
               this->bindless_access[i] = access;
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniforms.cpp:970:80:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
               prog->_LinkedShaders[shader_type]->Program->sh.ImageAccess[i] = access;
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_shared_reference.cpp:415:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(func_name, "%s_shared", ir->callee_name());
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_ubo_reference.cpp:1042:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(func_name, "%s_ssbo", ir->callee_name());
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/main.cpp:64:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(header, name);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/standalone_scaffolding.cpp:51:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, fmt, vargs);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/standalone_scaffolding.cpp:69:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, fmt, vargs);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/dd.h:719:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                             GLsizeiptr length, GLbitfield access,
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/dd.h:1037:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                           GLenum access, GLboolean output,
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/dd.h:1042:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                             GLenum access, GLboolean output,
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/dd.h:1142:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                   GLenum access, bool resident);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/imports.c:61:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define vsnprintf _vsnprintf
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/imports.c:63:12:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
extern int vsnprintf(char *str, size_t count, const char *fmt, va_list arg);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/imports.c:219:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   return vsnprintf( str, size, fmt, args);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/imports.c:229:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   r = vsnprintf( str, size, fmt, args );
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/mtypes.h:2029:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   GLenum16 access;
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:478:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   size = vsnprintf(&junk, 1, fmt, args);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:494:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      vsnprintf(ptr, size, fmt, args);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:552:4:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   vsnprintf(ptr + *start, new_length + 1, fmt, args);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:829:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      vsnprintf(ptr, size, fmt, args);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:887:4:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   vsnprintf(ptr + *start, new_length + 1, fmt, args);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/string_buffer.c:117:21:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      int32_t len = vsnprintf(str->buf + str->length,
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_string.h:68:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define sprintf util_sprintf
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_string.h:75:4:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   vsnprintf(str, (size_t)-1, format, ap);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_string.h:87:12:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   int r = vsnprintf(NULL, 0, format, ap_copy);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_string.h:98:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   return vsnprintf(*ret, r + 1, format, ap);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:33682:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  { "access",       (sqlite3_syscall_ptr)access,     0  },
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:51512:28:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define sqlite3DebugPrintf printf
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:64126:42:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define TRACE(X)  if(sqlite3BtreeTrace){printf X;fflush(stdout);}
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:79142:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(pOut, zFormat1, pc, 
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:85313:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(p->flags & MEM_Zero ? " NULL-nochng" : " NULL");
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:117603:14:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    FUNCTION(printf,            -1, 0, 0, printfFunc       ),
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:190409:35:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define GEODEBUG(X) if(geo_debug)printf X
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/miniunz.c:154:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(buffer,newdir);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:31:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#    define access(path,mode)   _access(path,mode)
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:137:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(buffer,arcname);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:142:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
       strcpy(buffer+origlen,TGZsuffix[i]);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:143:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
       if (access(buffer,F_OK) == 0)
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:158:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr,(TGZsuffix[i+1]) ? "%s%s, " : "or %s%s\n",
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:586:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dest, log->path);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:878:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(log->id, LOGID);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:888:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(log->path, path);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c:75:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
struct access {
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c:82:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
local void free_index(struct access *index)
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c:92:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
local struct access *addpoint(struct access *index, int bits,
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c:92:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
local struct access *addpoint(struct access *index, int bits,
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c:99:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        index = malloc(sizeof(struct access));
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c:144:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
local int build_index(FILE *in, off_t span, struct access **built)
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c:149:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    struct access *index;       /* access points being generated */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c:249:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
local int extract(FILE *in, struct access *index, off_t offset,
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c:359:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    struct access *index = NULL;
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzguts.h:86:18:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#    if !defined(vsnprintf) && !defined(NO_vsnprintf)
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzguts.h:88:18:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#         define vsnprintf _vsnprintf
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzguts.h:110:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define snprintf _snprintf
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzguts.h:110:20:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define snprintf _snprintf
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzlib.c:216:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(state->path, path);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzlib.c:614:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(state->msg, state->path);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzlib.c:616:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(state->msg, msg);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzwrite.c:417:11:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    (void)vsprintf(next, format, va);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzwrite.c:421:11:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = vsprintf(next, format, va);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzwrite.c:425:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    (void)vsnprintf(next, state->size, format, va);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzwrite.c:428:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = vsnprintf(next, state->size, format, va);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzwrite.c:511:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(next, format, a1, a2, a3, a4, a5, a6, a7, a8, a9, a10, a11, a12,
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzwrite.c:517:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = sprintf(next, format, a1, a2, a3, a4, a5, a6, a7, a8, a9, a10, a11,
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzwrite.c:522:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(next, state->size, format, a1, a2, a3, a4, a5, a6, a7, a8, a9,
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzwrite.c:526:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = snprintf(next, state->size, format, a1, a2, a3, a4, a5, a6, a7, a8,
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/infcover.c:529:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(prefix, id);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/infcover.c:555:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(prefix, id);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:44:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define snprintf _snprintf
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:44:20:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define snprintf _snprintf
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:473:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(outfile, file);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:474:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(outfile, GZ_SUFFIX);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:513:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, file);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:526:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(infile, GZ_SUFFIX);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/zutil.h:242:39:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Trace(x) {if (z_verbose>=0) fprintf x ;}
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/zutil.h:243:39:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracev(x) {if (z_verbose>0) fprintf x ;}
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/zutil.h:244:40:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracevv(x) {if (z_verbose>1) fprintf x ;}
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/zutil.h:245:48:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracec(c,x) {if (z_verbose>0 && (c)) fprintf x ;}
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/zutil.h:246:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracecv(c,x) {if (z_verbose>1 && (c)) fprintf x ;}
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4138:23:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
# define mdb_name_cpy	wcscpy
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4143:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
# define mdb_name_cpy	strcpy	/**< Copy name (#mdb_nchar_t string) */
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4182:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(fname->mn_val, path);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4834:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(env->me_txns->mti_rmname, "Global\\MDBr%s", encbuf);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4835:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(env->me_txns->mti_wmname, "Global\\MDBw%s", encbuf);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4861:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(env->me_txns->mti_rmname, "/MDBr%s", encbuf);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4862:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(env->me_txns->mti_wmname, "/MDBw%s", encbuf);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:10095:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(buf, txnid == (txnid_t)-1 ?
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb_stat.c:196:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
						printf(span>1 ? "     %9"Z"u[%"Z"d]\n" : "     %9"Z"u\n",
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest.c:21:53:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define CHECK(test, msg) ((test) ? (void)0 : ((void)fprintf(stderr, \
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest2.c:24:53:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define CHECK(test, msg) ((test) ? (void)0 : ((void)fprintf(stderr, \
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest3.c:24:53:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define CHECK(test, msg) ((test) ? (void)0 : ((void)fprintf(stderr, \
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest4.c:24:53:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define CHECK(test, msg) ((test) ? (void)0 : ((void)fprintf(stderr, \
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest5.c:24:53:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define CHECK(test, msg) ((test) ? (void)0 : ((void)fprintf(stderr, \
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest6.c:24:53:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define CHECK(test, msg) ((test) ? (void)0 : ((void)fprintf(stderr, \
data/mozjs78-78.4.0/third_party/rust/lucet-runtime-internals/src/context/tests/c_child.c:122:15:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    int res = vsnprintf(output_cursor, output_cursor_len, fmt, args);
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/fs.c:102:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    res = access("/sandbox/testfile2", R_OK);
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/fs.c:108:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    res = access("/sandbox/testfile-link", R_OK);
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/fs.c:154:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    res = access("/sandbox/a/b/c", R_OK);
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/stat.c:40:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    ret = access(PATH, R_OK);
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_common.hpp:242:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(buf, SPIRV_CROSS_FLT_FMT, t);
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_common.hpp:256:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(buf, SPIRV_CROSS_FLT_FMT, t);
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_common.hpp:579:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		spv::AccessQualifier access;
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_c.cpp:1914:84:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	return static_cast<SpvAccessQualifier>(static_cast<const SPIRType *>(type)->image.access);
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_glsl.cpp:3964:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(print_buffer, "0x%llx%s", static_cast<unsigned long long>(u64_value),
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_msl.cpp:11051:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		switch (img_type.access)
data/mozjs78-78.4.0/tools/fuzzing/interface/FuzzingInterface.cpp:21:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, aFmt, ap);
data/mozjs78-78.4.0/tools/fuzzing/interface/FuzzingInterface.h:74:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr,                                                     \
data/mozjs78-78.4.0/tools/fuzzing/interface/FuzzingInterfaceStream.h:42:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr,                                                     \
data/mozjs78-78.4.0/tools/fuzzing/interface/harness/FuzzerTestHarness.h:50:3:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vprintf(msg, ap);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIO.cpp:125:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(OutputFile, Fmt, ap);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIO.cpp:134:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(OutputFile, Fmt, ap);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtilLinux.cpp:24:19:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  int exit_code = system(CmdLine.c_str());
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtilPosix.cpp:154:10:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  return popen(Command, Mode);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtilWindows.cpp:160:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  return system(CmdLine.c_str());
data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/FileOperations.cpp:145:8:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  if (!realpath(Filename.c_str(), Full)) {
data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/MozsearchIndexer.cpp:377:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      char* Platform = getenv("MOZSEARCH_PLATFORM");
data/mozjs78-78.4.0/build/clang-plugin/tests/TestLoadLibraryUsage.cpp:14:13:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
  auto h7 = LoadLibrary(nullptr); // expected-error {{Usage of ASCII file functions (such as LoadLibraryA) is forbidden.}}
data/mozjs78-78.4.0/build/clang-plugin/tests/TestLoadLibraryUsage.cpp:15:13:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
  auto h8 = LoadLibrary("C:\\Some\\Path");
data/mozjs78-78.4.0/build/clang-plugin/tests/TestLoadLibraryUsage.cpp:17:13:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
  auto h9 = LoadLibraryEx(nullptr, nullptr, 0); // expected-error {{Usage of ASCII file functions (such as LoadLibraryExA) is forbidden.}}
data/mozjs78-78.4.0/build/clang-plugin/tests/TestLoadLibraryUsage.cpp:18:14:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
  auto h10 = LoadLibraryEx("C:\\Some\\Path", nullptr, 0);
data/mozjs78-78.4.0/config/nsinstall.c:243:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((opt = getopt(argc, argv, "C:DdlL:Rm:o:g:t")) != EOF) {
data/mozjs78-78.4.0/config/nsinstall.c:301:11:  [3] (buffer) getwd:
  This does not protect against buffer overflows by itself, so use with
  caution (CWE-120, CWE-20). Use getcwd instead.
    cwd = getwd(cwd);
data/mozjs78-78.4.0/config/nsinstall.c:315:11:  [3] (buffer) getwd:
  This does not protect against buffer overflows by itself, so use with
  caution (CWE-120, CWE-20). Use getcwd instead.
  todir = getwd(todir);
data/mozjs78-78.4.0/config/windows-h-unicode.decls.h:84:6:  [3] (tmpfile) GetTempFileName:
  Temporary file race condition in certain cases (e.g., if run as SYSTEM in
  many versions of Windows) (CWE-377).
UINT GetTempFileName(LPCTSTR, LPCTSTR, UINT, LPTSTR);
data/mozjs78-78.4.0/config/windows-h-unicode.decls.h:104:6:  [3] (shell) CreateProcessAsUser:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Especially watch out for embedded spaces.
BOOL CreateProcessAsUser(HANDLE, LPCTSTR, LPTSTR, LPSECURITY_ATTRIBUTES,
data/mozjs78-78.4.0/config/windows-h-unicode.decls.h:132:9:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
HMODULE LoadLibraryEx(LPCTSTR, HANDLE, DWORD);
data/mozjs78-78.4.0/config/windows-h-unicode.decls.h:144:9:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
HMODULE LoadLibrary(LPCTSTR);
data/mozjs78-78.4.0/intl/icu/source/common/icuplug.cpp:728:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *env = getenv("ICU_PLUGINS");
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:256:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *fake_start = getenv("U_FAKETIME_START");
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:857:68:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    fprintf(stderr, "TZ=%s std=%s dst=%s daylight=%d offset=%d\n", getenv("TZ"), stdID, dstID, daylightType, offset);
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1087:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    tzid = getenv("TZ");
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1382:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        path=getenv("ICU_DATA");
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1396:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *prefix = getenv(ICU_DATA_DIR_PREFIX_ENV_VAR);
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1464:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *prefix = getenv(ICU_TIMEZONE_FILES_DIR_PREFIX_ENV_VAR);
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1479:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    dir = getenv("ICU_TIMEZONE_FILES_DIR");
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1554:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            posixID = getenv("LC_ALL");
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1560:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                posixID = getenv(category == LC_MESSAGES ? "LC_MESSAGES" : "LC_CTYPE");
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1564:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                posixID = getenv(category == LC_MESSAGES ? "LC_MESSAGES" : "LC_CTYPE");
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1567:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                    posixID = getenv("LANG");
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1800:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const  char *localeID = getenv("LC_ALL");
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1804:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        localeID = getenv("LANG");
data/mozjs78-78.4.0/intl/icu/source/common/rbbi.cpp:308:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char *debugEnv = getenv("U_RBBIDEBUG");
data/mozjs78-78.4.0/intl/icu/source/common/rbbidata.cpp:132:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *debugEnv = getenv("U_RBBIDEBUG");
data/mozjs78-78.4.0/intl/icu/source/common/rbbirb.cpp:56:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    fDebugEnv   = getenv("U_RBBIDEBUG");
data/mozjs78-78.4.0/intl/icu/source/i18n/japancal.cpp:86:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *envVarVal = getenv(TENTATIVE_ERA_VAR_NAME);
data/mozjs78-78.4.0/intl/icu/source/i18n/usearch.cpp:3855:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("USEARCH_DEBUG") != NULL) {
data/mozjs78-78.4.0/intl/icu/source/i18n/usearch.cpp:4087:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("USEARCH_DEBUG") != NULL) {
data/mozjs78-78.4.0/intl/icu/source/i18n/usearch.cpp:4114:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("USEARCH_DEBUG") != NULL) {
data/mozjs78-78.4.0/intl/icu/source/i18n/usearch.cpp:4155:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("USEARCH_DEBUG") != NULL) {
data/mozjs78-78.4.0/intl/icu/source/i18n/usearch.cpp:4381:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("USEARCH_DEBUG") != NULL) {
data/mozjs78-78.4.0/intl/icu/source/i18n/usearch.cpp:4397:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("USEARCH_DEBUG") != NULL) {
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1475:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            if (env_tmp = getenv("ICU_PDS_NAME")) {
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1479:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                strcat(PDS_Name, getenv("ICU_PDS_NAME_SUFFIX"));
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1480:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            } else if (env_tmp = getenv("PDS_NAME_PREFIX")) {
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1490:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            if (env_tmp = getenv("ICU_PDS_NAME")) {
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1494:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                strcat(PDS_Name, getenv("ICU_PDS_NAME_SUFFIX"));
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1495:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            } else if (env_tmp = getenv("PDS_NAME_PREFIX")) {
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1509:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                    getenv("LOADMOD"),
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:1207:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	name = getenv("TZ");
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:212:12:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
extern int	getopt(int argc, char * const argv[],
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:386:10:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
		switch(getopt(argc, argv, "ac:d:it:vV")) {
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:406:12:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	  switch (getopt(argc, argv, "c:t:vV")) {
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:128:12:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
extern int	getopt(int argc, char * const argv[],
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:639:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "d:l:p:L:vsy:")) != EOF && c != -1)
data/mozjs78-78.4.0/js/public/Utility.h:311:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
          if (getenv("MOZ_FUZZ_CRASH_ON_LARGE_ALLOC")) {                \
data/mozjs78-78.4.0/js/src/builtin/Profilers.cpp:476:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!getenv("MOZ_PROFILE_WITH_PERF") ||
data/mozjs78-78.4.0/js/src/builtin/Profilers.cpp:477:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      !strlen(getenv("MOZ_PROFILE_WITH_PERF"))) {
data/mozjs78-78.4.0/js/src/builtin/Profilers.cpp:509:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char* flags = getenv("MOZ_PROFILE_PERF_FLAGS");
data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.cpp:134:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* value = getenv(name);
data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.cpp:144:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  *valueOut = atoi(getenv(name));
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/closures.c:300:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *value = getenv (envvar);
data/mozjs78-78.4.0/js/src/devtools/rootAnalysis/t/sixgill-tree/source.cpp:55:40:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
void root_arg(JSObject* obj, JSObject* random) {
data/mozjs78-78.4.0/js/src/devtools/rootAnalysis/t/sixgill-tree/source.cpp:64:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  obj = random;
data/mozjs78-78.4.0/js/src/editline/editline.c:248:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((term = getenv("TERM")) == NULL)
data/mozjs78-78.4.0/js/src/editline/editline.c:332:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((Input = (CHAR *)getenv((char *)name)) == NULL) {
data/mozjs78-78.4.0/js/src/editline/editline.h:84:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
extern char	*getenv();
data/mozjs78-78.4.0/js/src/fuzz-tests/tests.cpp:80:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* fuzzerEnv = getenv("FUZZER");
data/mozjs78-78.4.0/js/src/fuzz-tests/tests.cpp:87:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  std::string moduleNameStr(getenv("FUZZER"));
data/mozjs78-78.4.0/js/src/gc/GC.cpp:1241:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char* size = getenv("JSGC_MARK_STACK_LIMIT");
data/mozjs78-78.4.0/js/src/gc/GC.cpp:1250:41:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char* pretenureThresholdStr = getenv("JSGC_PRETENURE_THRESHOLD");
data/mozjs78-78.4.0/js/src/gc/GC.cpp:1263:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* zealSpec = getenv("JS_GC_ZEAL");
data/mozjs78-78.4.0/js/src/gc/Nursery.cpp:237:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* env = getenv("MOZ_NURSERY_STRINGS");
data/mozjs78-78.4.0/js/src/gc/Nursery.cpp:241:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  env = getenv("MOZ_NURSERY_BIGINTS");
data/mozjs78-78.4.0/js/src/gc/Nursery.cpp:259:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char* env = getenv("JS_GC_PROFILE_NURSERY");
data/mozjs78-78.4.0/js/src/gc/Nursery.cpp:271:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  env = getenv("JS_GC_REPORT_TENURING");
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:101:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* value = getenv(env);
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:116:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      const char* dir = getenv("MOZ_UPLOAD_DIR");
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:821:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* env = getenv("JS_GC_PROFILE");
data/mozjs78-78.4.0/js/src/jit/CacheIRSpewer.cpp:297:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      getenv("CACHEIR_LOG_FLUSH") ? atoi(getenv("CACHEIR_LOG_FLUSH")) : 10000;
data/mozjs78-78.4.0/js/src/jit/CacheIRSpewer.cpp:297:42:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      getenv("CACHEIR_LOG_FLUSH") ? atoi(getenv("CACHEIR_LOG_FLUSH")) : 10000;
data/mozjs78-78.4.0/js/src/jit/JitContext.cpp:139:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* env = getenv("CACHEIR_LOGS");
data/mozjs78-78.4.0/js/src/jit/JitOptions.cpp:39:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char* str = getenv(param);
data/mozjs78-78.4.0/js/src/jit/JitOptions.cpp:234:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (const char* env = getenv(forcedRegisterAllocatorEnv)) {
data/mozjs78-78.4.0/js/src/jit/JitSpewer.cpp:155:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  gSpewFilter = getenv("IONFILTER");
data/mozjs78-78.4.0/js/src/jit/JitSpewer.cpp:161:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* usePid = getenv("ION_SPEW_BY_PID");
data/mozjs78-78.4.0/js/src/jit/JitSpewer.cpp:410:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char* env = getenv("IONFLAGS");
data/mozjs78-78.4.0/js/src/jit/JitSpewer.cpp:517:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* filename = getenv("ION_SPEW_FILENAME");
data/mozjs78-78.4.0/js/src/jit/PerfSpewer.cpp:78:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char* env = getenv("IONPERF");
data/mozjs78-78.4.0/js/src/jit/arm/Architecture-arm.cpp:208:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* env = getenv("ARMHWCAP");
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:2623:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char* fillStr = getenv("ARM_ASM_NOP_FILL");
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:2641:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char* poolMaxOffsetStr = getenv("ASM_POOL_MAX_OFFSET");
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:411:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char* stopAtStr = getenv("ARM_SIM_STOP_AT");
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1233:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("ARM_SIM_ICACHE_CHECKS")) {
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:3347:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
          if (getenv("ARM_SIM_DEBUGGER")) {
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozSimulator-vixl.cpp:141:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("VIXL_STATS")) {
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozSimulator-vixl.cpp:179:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("USE_DEBUGGER") != nullptr) {
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozSimulator-vixl.cpp:301:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("USE_DEBUGGER"))
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozSimulator-vixl.cpp:877:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("USE_DEBUGGER"))
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:501:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char* stopAtStr = getenv("MIPS_SIM_STOP_AT");
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:1291:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("MIPS_SIM_ICACHE_CHECKS")) {
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:544:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char* stopAtStr = getenv("MIPS_SIM_STOP_AT");
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:1318:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("MIPS_SIM_ICACHE_CHECKS")) {
data/mozjs78-78.4.0/js/src/jit/shared/AtomicOperations-shared-jit.cpp:633:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* flag = getenv("JS_NO_UNALIGNED_MEMCPY");
data/mozjs78-78.4.0/js/src/jsapi-tests/testBinASTReader.cpp:56:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* destination = getenv("CPP_UNIT_TESTS_DIR_JS_SRC");
data/mozjs78-78.4.0/js/src/jsapi-tests/testBinASTReader.cpp:505:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char* topSrcDir = getenv("TOPSRCDIR");
data/mozjs78-78.4.0/js/src/jsapi-tests/testHashTable.cpp:110:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  srand(seed);
data/mozjs78-78.4.0/js/src/jsapi-tests/testHashTable.cpp:129:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  srand(seed);
data/mozjs78-78.4.0/js/src/jsnum.cpp:1310:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  thousandsSeparator = getenv("LOCALE_THOUSANDS_SEP");
data/mozjs78-78.4.0/js/src/jsnum.cpp:1311:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  decimalPoint = getenv("LOCALE_DECIMAL_POINT");
data/mozjs78-78.4.0/js/src/jsnum.cpp:1312:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  grouping = getenv("LOCALE_GROUPING");
data/mozjs78-78.4.0/js/src/shell/OSObject.cpp:846:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (const char* valueBytes = getenv(keyBytes.get())) {
data/mozjs78-78.4.0/js/src/shell/js.cpp:222:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
static bool fuzzDoDebug = !!getenv("MOZ_FUZZ_DEBUG");
data/mozjs78-78.4.0/js/src/shell/js.cpp:223:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
static bool fuzzHaveModule = !!getenv("FUZZER");
data/mozjs78-78.4.0/js/src/shell/js.cpp:10826:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        (getenv("MOZ_FUZZING_SAFE") && getenv("MOZ_FUZZING_SAFE")[0] != '0');
data/mozjs78-78.4.0/js/src/shell/js.cpp:10826:40:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        (getenv("MOZ_FUZZING_SAFE") && getenv("MOZ_FUZZING_SAFE")[0] != '0');
data/mozjs78-78.4.0/js/src/shell/js.cpp:10907:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* outPath = getenv(envVar);
data/mozjs78-78.4.0/js/src/shell/js.cpp:10925:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* crash_option = getenv("XRE_NO_WINDOWS_CRASH_DIALOG");
data/mozjs78-78.4.0/js/src/shell/jsrtfuzzing/jsrtfuzzing.cpp:58:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  gFuzzModuleName = getenv("FUZZER");
data/mozjs78-78.4.0/js/src/util/StructuredSpewer.cpp:43:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("SPEW_UPLOAD") && getenv("MOZ_UPLOAD_DIR")) {
data/mozjs78-78.4.0/js/src/util/StructuredSpewer.cpp:43:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("SPEW_UPLOAD") && getenv("MOZ_UPLOAD_DIR")) {
data/mozjs78-78.4.0/js/src/util/StructuredSpewer.cpp:44:50:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      SprintfLiteral(filename, "%s/spew_output", getenv("MOZ_UPLOAD_DIR"));
data/mozjs78-78.4.0/js/src/util/StructuredSpewer.cpp:45:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    } else if (getenv("SPEW_FILE")) {
data/mozjs78-78.4.0/js/src/util/StructuredSpewer.cpp:46:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      SprintfLiteral(filename, "%s", getenv("SPEW_FILE"));
data/mozjs78-78.4.0/js/src/util/StructuredSpewer.cpp:103:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  static const char* pattern = getenv("SPEW_FILTER");
data/mozjs78-78.4.0/js/src/util/StructuredSpewer.h:115:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("SPEW")) {
data/mozjs78-78.4.0/js/src/util/StructuredSpewer.h:116:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      parseSpewFlags(getenv("SPEW"));
data/mozjs78-78.4.0/js/src/util/Utility.cpp:87:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char* limitStr = getenv("MOZ_FUZZ_LARGE_ALLOC_LIMIT");
data/mozjs78-78.4.0/js/src/vm/CodeCoverage.cpp:506:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* outDir = getenv("JS_CODE_COVERAGE_OUTPUT_DIR");
data/mozjs78-78.4.0/js/src/vm/CodeCoverage.cpp:527:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* outDir = getenv("JS_CODE_COVERAGE_OUTPUT_DIR");
data/mozjs78-78.4.0/js/src/vm/DateTime.cpp:729:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (const char* tz = std::getenv("TZ")) {
data/mozjs78-78.4.0/js/src/vm/FrameIter.cpp:1032:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char* env = getenv("MOZ_SHOW_ALL_JS_FRAMES");
data/mozjs78-78.4.0/js/src/vm/Initialization.cpp:160:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  js::gDisablePoisoning = bool(getenv("JSGC_DISABLE_POISONING"));
data/mozjs78-78.4.0/js/src/vm/Time.cpp:147:25:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#  define MUTEX_LOCK(m) EnterCriticalSection(m)
data/mozjs78-78.4.0/js/src/vm/TraceLogging.cpp:38:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char* str = getenv("JS_TRACE_LOGGING");
data/mozjs78-78.4.0/js/src/vm/TraceLogging.cpp:1120:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* env = getenv("TLLOG");
data/mozjs78-78.4.0/js/src/vm/TraceLogging.cpp:1216:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* options = getenv("TLOPTIONS");
data/mozjs78-78.4.0/js/src/vm/TraceLogging.cpp:1493:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* env = getenv("JS_TRACELOGGER_SPEW");
data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.cpp:58:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      getenv("TLDIR") ? getenv("TLDIR") : DEFAULT_TRACE_LOG_DIR;
data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.cpp:58:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      getenv("TLDIR") ? getenv("TLDIR") : DEFAULT_TRACE_LOG_DIR;
data/mozjs78-78.4.0/js/src/vm/TypeInference.cpp:173:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char* env = getenv("INFERFLAGS");
data/mozjs78-78.4.0/js/src/vm/TypeInference.cpp:198:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char* env = getenv("TERM");
data/mozjs78-78.4.0/js/src/vtune/ittnotify_config.h:276:35:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
#define __itt_mutex_init(mutex)   InitializeCriticalSection(mutex)
data/mozjs78-78.4.0/js/src/vtune/ittnotify_config.h:277:35:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#define __itt_mutex_lock(mutex)   EnterCriticalSection(mutex)
data/mozjs78-78.4.0/js/src/vtune/ittnotify_static.c:835:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char* env = getenv(name);
data/mozjs78-78.4.0/js/src/vtune/jitprofiling.c:244:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    dllName = getenv(NEW_DLL_ENVIRONMENT_VAR);
data/mozjs78-78.4.0/js/src/vtune/jitprofiling.c:246:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        dllName = getenv(DLL_ENVIRONMENT_VAR);
data/mozjs78-78.4.0/memory/build/Mutex.h:61:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(&mMutex);
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:198:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#  define getenv xgetenv
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:199:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
static char* getenv(const char* name) {
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:3889:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((opts = getenv("MALLOC_OPTIONS"))) {
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:4603:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* replace_malloc_lib = getenv("MOZ_REPLACE_MALLOC_LIB");
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBufferEntry.cpp:664:39:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            const char* symbolicate = getenv("MOZ_PROFILER_SYMBOLICATE");
data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform-linux-android.cpp:431:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("MOZ_PROFILER_LUL_TEST")) {
data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.cpp:156:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      getenv("MOZ_BASE_PROFILER_VERBOSE_LOGGING")
data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.cpp:158:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
          : getenv("MOZ_BASE_PROFILER_DEBUG_LOGGING")
data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.cpp:160:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                : getenv("MOZ_BASE_PROFILER_LOGGING") ? 3 : 0;
data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.cpp:2473:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("MOZ_BASE_PROFILER_HELP")) {
data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.cpp:2508:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char* startupEnv = getenv("MOZ_PROFILER_STARTUP");
data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.cpp:2521:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char* startupCapacity = getenv("MOZ_PROFILER_STARTUP_ENTRIES");
data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.cpp:2541:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char* startupDuration = getenv("MOZ_PROFILER_STARTUP_DURATION");
data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.cpp:2559:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char* startupInterval = getenv("MOZ_PROFILER_STARTUP_INTERVAL");
data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.cpp:2578:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        getenv("MOZ_PROFILER_STARTUP_FEATURES_BITFIELD");
data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.cpp:2591:37:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      const char* startupFeatures = getenv("MOZ_PROFILER_STARTUP_FEATURES");
data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.cpp:2605:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char* startupFilters = getenv("MOZ_PROFILER_STARTUP_FILTERS");
data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.cpp:2646:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      const char* filename = getenv("MOZ_PROFILER_SHUTDOWN");
data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-win32.cc:236:9:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        LoadLibraryEx(modulePath, NULL, LOAD_LIBRARY_AS_DATAFILE);
data/mozjs78-78.4.0/mozglue/misc/StackWalk.cpp:179:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  ::InitializeCriticalSection(&gDbgHelpCS);
data/mozjs78-78.4.0/mozglue/misc/StackWalk.cpp:250:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(&gDbgHelpCS);
data/mozjs78-78.4.0/mozglue/misc/StackWalk.cpp:586:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&gDbgHelpCS);
data/mozjs78-78.4.0/mozglue/misc/TimeStamp.cpp:75:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char* mozAppRestart = getenv("MOZ_APP_RESTART");
data/mozjs78-78.4.0/mozglue/misc/TimeStamp_windows.cpp:26:7:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    ::EnterCriticalSection(mSection);
data/mozjs78-78.4.0/mozglue/misc/TimeStamp_windows.cpp:456:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char* modevar = getenv("MOZ_TIMESTAMP_MODE");
data/mozjs78-78.4.0/mozglue/misc/interceptor/Trampoline.h:471:7:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    ::EnterCriticalSection(&aCS);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:146:19:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while ((opt = getopt(argc, argv, "C:DdlL:Rm:o:g:t")) != EOF) {
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:364:9:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        setstate(failbit);
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:375:9:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        setstate(failbit);
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:383:9:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        setstate(failbit);
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:391:9:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        setstate(failbit);
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:426:9:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        setstate(failbit);
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:437:9:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        setstate(failbit);
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:445:9:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        setstate(failbit);
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:453:9:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        setstate(failbit);
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:488:9:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        setstate(failbit);
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:499:9:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        setstate(failbit);
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:507:9:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        setstate(failbit);
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:515:9:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        setstate(failbit);
data/mozjs78-78.4.0/nsprpub/lib/tests/arena.c:355:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srand( (unsigned)time( NULL ) ); /* seed random number generator */
data/mozjs78-78.4.0/nsprpub/pr/include/md/_pcos.h:24:12:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
extern int getopt(int argc, char **argv, char *spec);
data/mozjs78-78.4.0/nsprpub/pr/include/md/_unixos.h:266:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define _MD_GET_ENV             getenv
data/mozjs78-78.4.0/nsprpub/pr/include/md/_win95.h:390:39:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#define _MD_LOCK(lock)                EnterCriticalSection(&((lock)->mutex))
data/mozjs78-78.4.0/nsprpub/pr/include/md/_win95.h:391:40:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#define _MD_TEST_AND_LOCK(lock)       (EnterCriticalSection(&((lock)->mutex)),0)
data/mozjs78-78.4.0/nsprpub/pr/include/md/_winnt.h:396:40:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
#define _MD_NEW_LOCK(lock)            (InitializeCriticalSection(&((lock)->mutex)),PR_SUCCESS)
data/mozjs78-78.4.0/nsprpub/pr/include/md/_winnt.h:399:39:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#define _MD_LOCK(lock)                EnterCriticalSection(&((lock)->mutex))
data/mozjs78-78.4.0/nsprpub/pr/include/md/_winnt.h:410:9:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
        EnterCriticalSection(&((lock)->mutex)); \
data/mozjs78-78.4.0/nsprpub/pr/include/prwin16.h:80:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    void *  (PR_CALLBACK *getenv)( const char *name);
data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/ranfile.cpp:112:34:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    LL_USHR(shift, *((PRUint64*)&random), 16);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:265:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    ev = getenv("LD_LIBRARY_PATH");
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:278:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        ev = getenv("LD_LIBRARY_PATH");
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:585:20:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    resolvedPath = realpath(name, pathBuf);
data/mozjs78-78.4.0/nsprpub/pr/src/malloc/prmalloc.c:423:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    for (p=getenv("MALLOC_OPTIONS"); p && *p; p++) {
data/mozjs78-78.4.0/nsprpub/pr/src/malloc/prmem.c:159:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    } else if ((envp = getenv("NSPR_USE_ZONE_ALLOCATOR")) != NULL) {
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2inrval.c:25:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((envp = getenv("NSPR_OS2_NO_HIRES_TIMER")) != NULL) {
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:27:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    return getenv(name);
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/aix.c:88:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (evp = getenv("NSPR_AIX_SEND_FILE_USE_DISABLED")) {
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:2055:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((eval = getenv("NSPR_NOCLOCK")) != NULL) {
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:2793:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("NSPR_SIGSEGV_HANDLE")) {
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:2800:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("NSPR_SIGABRT_HANDLE")) {
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:2807:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("NSPR_SIGBUS_HANDLE")) {
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:2864:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("NSPR_NO_MMAP")) {
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntmisc.c:17:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    return getenv(name);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntmisc.c:147:9:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
        InitializeCriticalSection(&calibration.calibration_lock);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntmisc.c:148:9:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
        InitializeCriticalSection(&calibration.data_lock);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntmisc.c:207:13:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
            EnterCriticalSection(&calibration.calibration_lock);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntmisc.c:208:13:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
            EnterCriticalSection(&calibration.data_lock);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntmisc.c:246:13:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
            EnterCriticalSection(&calibration.data_lock);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntmisc.c:695:14:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
    retVal = CreateProcess(NULL,
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntmisc.c:695:14:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
    retVal = CreateProcess(NULL,
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntsec.c:210:24:  [3] (misc) AddAccessAllowedAce:
  This doesn't set the inheritance bits in the access control entry (ACE)
  header (CWE-732). Make sure that you set inheritance by hand if you wish it
  to inherit.
    if (accessMask && !AddAccessAllowedAce(pACL, ACL_REVISION, accessMask,
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntsec.c:225:24:  [3] (misc) AddAccessAllowedAce:
  This doesn't set the inheritance bits in the access control entry (ACE)
  header (CWE-732). Make sure that you set inheritance by hand if you wish it
  to inherit.
    if (accessMask && !AddAccessAllowedAce(pACL, ACL_REVISION, accessMask,
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntsec.c:240:24:  [3] (misc) AddAccessAllowedAce:
  This doesn't set the inheritance bits in the access control entry (ACE)
  header (CWE-732). Make sure that you set inheritance by hand if you wish it
  to inherit.
    if (accessMask && !AddAccessAllowedAce(pACL, ACL_REVISION, accessMask,
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95cv.c:254:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(&(lock->mutex));
data/mozjs78-78.4.0/nsprpub/pr/src/misc/pratom.c:87:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (((eval = getenv("NSPR_ATOMIC_HASH_LOCKS")) != NULL)  &&
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prinit.c:132:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    } else if (envp = getenv("NSPR_NATIVE_THREADS_ONLY")) {
data/mozjs78-78.4.0/nsprpub/pr/tests/dbmalloc.c:247:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srand(time(0));
data/mozjs78-78.4.0/nsprpub/pr/tests/ranfile.c:93:34:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    LL_USHR(shift, *((PRUint64*)&random), 16);
data/mozjs78-78.4.0/nsprpub/pr/tests/sel_spd.c:427:20:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while ( (opt = getopt(argc, argv, "c:s:i:t:v")) != EOF) {
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:900:19:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while ((opt = getopt(argc, argv, "d")) != EOF) {
data/mozjs78-78.4.0/nsprpub/pr/tests/tmoacc.c:38:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    PRBool random;
data/mozjs78-78.4.0/nsprpub/pr/tests/tmoacc.c:48:17:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    if (shared->random)
data/mozjs78-78.4.0/nsprpub/pr/tests/tmoacc.c:54:35:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        timeout = (3 * quarter) + random;  /* [75..125)% */
data/mozjs78-78.4.0/nsprpub/pr/tests/tmocon.c:76:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    PRBool random;
data/mozjs78-78.4.0/nsprpub/pr/tests/tmocon.c:90:17:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    if (shared->random)
data/mozjs78-78.4.0/nsprpub/pr/tests/tmocon.c:94:37:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        timeout = (((3 * quarter) + random) >> 2) + quarter;  /* [75..125)% */
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_common.c:162:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("PSUTIL_DEBUG") != NULL)
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_common.c:164:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("PSUTIL_TESTING") != NULL)
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_common.c:363:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    InitializeCriticalSection(&PSUTIL_CRITICAL_SECTION);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_handles.c:224:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(&PSUTIL_CRITICAL_SECTION);
data/mozjs78-78.4.0/third_party/python/pyyaml/ext/_yaml.c:28163:18:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            if (!setstate) PyErr_Clear();
data/mozjs78-78.4.0/third_party/python/pyyaml/ext/_yaml.c:28164:18:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            if (!setstate || __Pyx_setup_reduce_is_named(setstate, __pyx_n_s_setstate_cython)) {
data/mozjs78-78.4.0/third_party/python/pyyaml/ext/_yaml.c:28164:58:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            if (!setstate || __Pyx_setup_reduce_is_named(setstate, __pyx_n_s_setstate_cython)) {
data/mozjs78-78.4.0/third_party/python/pyyaml/ext/_yaml.c:28185:16:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    Py_XDECREF(setstate);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/gtest.h:866:39:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  void ShuffleTests(internal::Random* random);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-port.h:1647:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* const env = getenv(name);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-port.h:1650:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  return getenv(name);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-internal-inl.h:302:37:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
void ShuffleRange(internal::Random* random, int begin, int end,
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-internal-inl.h:323:39:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
inline void Shuffle(internal::Random* random, std::vector<E>* v) {
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-internal-inl.h:324:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  ShuffleRange(random, 0, static_cast<int>(v->size()), v);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-internal-inl.h:774:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  internal::Random* random() { return &random_; }
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:2463:47:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
void TestCase::ShuffleTests(internal::Random* random) {
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:2464:11:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  Shuffle(random, &test_indices_);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:4215:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      random()->Reseed(random_seed_);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:4486:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  ShuffleRange(random(), 0, last_death_test_case_ + 1, &test_case_indices_);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:4489:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  ShuffleRange(random(), last_death_test_case_ + 1,
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:4494:34:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    test_cases_[i]->ShuffleTests(random());
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:546:29:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  testing::internal::Random random(42);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:548:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      random.Generate(0),
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:551:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      random.Generate(testing::internal::Random::kMaxRange + 1),
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:558:29:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  testing::internal::Random random(12345);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:560:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    EXPECT_LT(random.Generate(kRange), kRange) << " for iteration " << i;
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:575:29:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  testing::internal::Random random(kSeed);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:577:17:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    values[i] = random.Generate(kRange);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:580:3:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  random.Reseed(kSeed);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:582:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    EXPECT_EQ(values[i], random.Generate(kRange)) << " for iteration " << i;
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:647:29:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  testing::internal::Random random(1);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:650:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      ShuffleRange(&random, -1, 1, &a),
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:653:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      ShuffleRange(&random, 4, 4, &a),
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:656:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      ShuffleRange(&random, 3, 2, &a),
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:659:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      ShuffleRange(&random, 3, 4, &a),
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_jack.cpp:212:23:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
   context->libjack = LoadLibrary("libjack64.dll");
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_jack.cpp:214:23:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
   context->libjack = LoadLibrary("libjack.dll");
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_sndio.c:136:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *dev = getenv("AUDIODEVICE");
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_utils_win.h:24:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    InitializeCriticalSection(&critical_section);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_utils_win.h:34:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(&critical_section);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_winmm.c:157:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&stm->lock);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_winmm.c:184:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&stm->lock);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_winmm.c:342:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  InitializeCriticalSection(&ctx->lock);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_winmm.c:459:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&context->lock);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_winmm.c:496:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  InitializeCriticalSection(&stm->lock);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_winmm.c:555:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(&stm->lock);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_winmm.c:574:7:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
      EnterCriticalSection(&stm->lock);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_winmm.c:579:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(&stm->lock);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_winmm.c:602:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&stm->context->lock);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_winmm.c:658:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&stm->lock);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_winmm.c:676:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&stm->lock);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_winmm.c:695:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&stm->lock);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_winmm.c:716:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&stm->lock);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_winmm.c:735:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&stm->lock);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/common.h:112:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  backend = getenv("CUBEB_BACKEND");
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c11/threads_win32.h:179:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(&cond->monitor);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c11/threads_win32.h:229:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(&cond->monitor);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c11/threads_win32.h:365:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    InitializeCriticalSection(&cond->monitor);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c11/threads_win32.h:430:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    InitializeCriticalSection(mtx);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c11/threads_win32.h:439:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(mtx);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp.c:145:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "d", long_options, NULL)) != -1) {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/main.cpp:81:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ((c = getopt_long(argc, argv, "", compiler_opts, &idx)) != -1) {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/shader_cache.cpp:190:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   char *ext_override = getenv("MESA_EXTENSION_OVERRIDE");
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/context.c:955:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   else if (getenv("MESA_DEBUG") || getenv("LIBGL_DEBUG")) {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/context.c:955:37:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   else if (getenv("MESA_DEBUG") || getenv("LIBGL_DEBUG")) {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/context.c:1250:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      = (getenv("MESA_TEX_PROG") != NULL);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/context.c:1253:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      = (getenv("MESA_TNL_PROG") != NULL);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/context.c:1671:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("MESA_INFO")) {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/debug.c:79:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   const char *str = getenv(var_name);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/debug.c:104:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   char *str = getenv(var_name);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:240:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   path = getenv("MESA_GLSL_CACHE_DIR");
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:251:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      char *xdg_cache_home = getenv("XDG_CACHE_HOME");
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:346:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   max_size_str = getenv("MESA_GLSL_CACHE_MAX_SIZE");
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:26863:7:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
      InitializeCriticalSection(&winMutex_staticMutexes[i].mutex);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:26957:9:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
        InitializeCriticalSection(&p->mutex);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:27023:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&p->mutex);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:36288:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    lk = random(); 
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:38975:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if( !azDirs[0] ) azDirs[0] = getenv("SQLITE_TMPDIR");
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:38976:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if( !azDirs[1] ) azDirs[1] = getenv("TMPDIR");
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:39441:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *envforce = getenv("SQLITE_FORCE_PROXY_LOCKING");
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:46175:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if( !azDirs[0] ) azDirs[0] = getenv("SQLITE_TMPDIR");
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:46176:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if( !azDirs[1] ) azDirs[1] = getenv("TMPDIR");
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:46177:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if( !azDirs[2] ) azDirs[2] = getenv("TMP");
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:46178:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if( !azDirs[3] ) azDirs[3] = getenv("TEMP");
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:46179:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if( !azDirs[4] ) azDirs[4] = getenv("USERPROFILE");
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:117615:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    VFUNCTION(random,            0, 0, 0, randomFunc       ),
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:402:11:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    this->setstate(std::ios_base::failbit);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:413:11:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    this->setstate(std::ios_base::failbit);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:423:11:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    this->setstate(std::ios_base::failbit);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:457:11:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    this->setstate(std::ios_base::failbit);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:468:11:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    this->setstate(std::ios_base::failbit);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:478:11:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    this->setstate(std::ios_base::failbit);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/crypt.h:112:9:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        srand((unsigned)(time(NULL) ^ ZCR_SEED2));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb_dump.c:185:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((i = getopt(argc, argv, "af:lnps:V")) != EOF) {
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb_load.c:309:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((i = getopt(argc, argv, "f:ns:NTV")) != EOF) {
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb_stat.c:70:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((i = getopt(argc, argv, "Vaefnrs:")) != EOF) {
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest.c:38:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest2.c:40:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest3.c:41:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest5.c:41:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest6.c:43:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/examples/hello.c:6:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *greeting = getenv("GREETING");
data/mozjs78-78.4.0/tools/fuzzing/interface/FuzzingInterface.cpp:16:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
static bool fuzzing_verbose = !!getenv("MOZ_FUZZ_LOG");
data/mozjs78-78.4.0/tools/fuzzing/interface/FuzzingInterface.h:72:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char* testFilePtr = getenv("MOZ_FUZZ_TESTFILE");                      \
data/mozjs78-78.4.0/tools/fuzzing/interface/FuzzingInterfaceStream.h:40:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char* testFilePtr = getenv("MOZ_FUZZ_TESTFILE");                      \
data/mozjs78-78.4.0/tools/fuzzing/interface/harness/FuzzerRunner.cpp:48:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* fuzzerEnv = getenv("FUZZER");
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIOPosix.cpp:145:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (auto Env = getenv("TMPDIR"))
data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/FileOperations.cpp:98:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char Full[_MAX_PATH];
data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/FileOperations.cpp:107:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FileDescriptor = open(SrcFile.c_str(), O_RDONLY);
data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/FileOperations.cpp:125:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int DstDescriptor = open(Filename.c_str(), O_RDONLY | O_CREAT, 0666);
data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/FileOperations.cpp:130:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int TmpDescriptor = open((Filename + ".tmp").c_str(), O_WRONLY | O_APPEND | O_CREAT, 0666);
data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/FileOperations.cpp:144:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char Full[4096];
data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/MozsearchIndexer.cpp:545:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char Buffer[65536];
data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/StringOperations.cpp:34:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char HashStr[41];
data/mozjs78-78.4.0/build/clang-plugin/tests/TestFopenUsage.cpp:8:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f1 = fopen("dummy.txt", "rt"); // expected-warning {{Usage of ASCII file functions (here fopen) is forbidden on Windows.}} expected-note {{On Windows executed functions: fopen, fopen_s, open, _open, _sopen, _sopen_s, OpenFile, CreateFileA should never be used due to lossy conversion from UTF8 to ANSI.}}
data/mozjs78-78.4.0/build/clang-plugin/tests/TestFopenUsage.cpp:13:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fh2 = open("dummy.txt", _O_RDONLY); // expected-warning {{Usage of ASCII file functions (here open) is forbidden on Windows.}} expected-note {{On Windows executed functions: fopen, fopen_s, open, _open, _sopen, _sopen_s, OpenFile, CreateFileA should never be used due to lossy conversion from UTF8 to ANSI.}}
data/mozjs78-78.4.0/build/clang-plugin/tests/TestFopenUsage.cpp:19:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fs1.open("dummy.txt"); // expected-warning {{Usage of ASCII file functions (here open) is forbidden on Windows.}} expected-note {{On Windows executed functions: fopen, fopen_s, open, _open, _sopen, _sopen_s, OpenFile, CreateFileA should never be used due to lossy conversion from UTF8 to ANSI.}}
data/mozjs78-78.4.0/build/clang-plugin/tests/TestFopenUsage.cpp:21:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ifs1.open("dummy.txt"); // expected-warning {{Usage of ASCII file functions (here open) is forbidden on Windows.}} expected-note {{On Windows executed functions: fopen, fopen_s, open, _open, _sopen, _sopen_s, OpenFile, CreateFileA should never be used due to lossy conversion from UTF8 to ANSI.}}
data/mozjs78-78.4.0/build/clang-plugin/tests/TestFopenUsage.cpp:23:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ofs1.open("dummy.txt"); // expected-warning {{Usage of ASCII file functions (here open) is forbidden on Windows.}} expected-note {{On Windows executed functions: fopen, fopen_s, open, _open, _sopen, _sopen_s, OpenFile, CreateFileA should never be used due to lossy conversion from UTF8 to ANSI.}}
data/mozjs78-78.4.0/build/clang-plugin/tests/TestFopenUsage.cpp:26:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fs2.open(L"dummy.txt");
data/mozjs78-78.4.0/build/clang-plugin/tests/TestFopenUsage.cpp:28:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ifs2.open(L"dummy.txt");
data/mozjs78-78.4.0/build/clang-plugin/tests/TestFopenUsage.cpp:30:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ofs2.open(L"dummy.txt");
data/mozjs78-78.4.0/build/clang-plugin/tests/TestGlobalClass.cpp:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[sizeof(Global)];
data/mozjs78-78.4.0/build/clang-plugin/tests/TestHeapClass.cpp:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[sizeof(Heap)];
data/mozjs78-78.4.0/build/clang-plugin/tests/TestInheritTypeAnnotationsFromTemplateArgs.cpp:29:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mForceInstantiation[sizeof(T)];
data/mozjs78-78.4.0/build/clang-plugin/tests/TestNonHeapClass.cpp:33:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[sizeof(NonHeap)];
data/mozjs78-78.4.0/build/clang-plugin/tests/TestNonTemporaryClass.cpp:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[sizeof(NonTemporary)];
data/mozjs78-78.4.0/build/clang-plugin/tests/TestSprintfLiteral.cpp:4:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char x[100];
data/mozjs78-78.4.0/build/clang-plugin/tests/TestSprintfLiteral.cpp:12:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char x[100];
data/mozjs78-78.4.0/build/clang-plugin/tests/TestSprintfLiteral.cpp:24:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char x[100];
data/mozjs78-78.4.0/build/clang-plugin/tests/TestSprintfLiteral.cpp:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char x[100];
data/mozjs78-78.4.0/build/clang-plugin/tests/TestStackClass.cpp:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[sizeof(Stack)];
data/mozjs78-78.4.0/build/clang-plugin/tests/TestStaticLocalClass.cpp:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[sizeof(StaticLocal)];
data/mozjs78-78.4.0/build/clang-plugin/tests/TestTemporaryClass.cpp:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[sizeof(Temporary)];
data/mozjs78-78.4.0/build/macosx/permissions/chown_revert.c:12:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uidstring[20];
data/mozjs78-78.4.0/build/unix/elfhack/elf.cpp:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char e_ident[EI_VERSION];
data/mozjs78-78.4.0/build/unix/elfhack/elf.cpp:903:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(alloc_str, string, len);
data/mozjs78-78.4.0/build/unix/elfhack/elfhack.cpp:189:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buf, (*c)->getData(), (*c)->getSize());
data/mozjs78-78.4.0/build/unix/elfhack/elfhack.cpp:356:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&value, base + r->r_offset, 4);
data/mozjs78-78.4.0/build/unix/elfhack/elfhack.cpp:358:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(base + r->r_offset, &value, 4);
data/mozjs78-78.4.0/build/unix/elfhack/elfhack.cpp:367:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(base + r->r_offset, &value, 4);
data/mozjs78-78.4.0/build/unix/stdc++compat/stdc++compat.cpp:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];  // That should be big enough.
data/mozjs78-78.4.0/build/win32/crashinject.cpp:21:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int pid = atoi(argv[1]);
data/mozjs78-78.4.0/build/win32/crashinject.cpp:28:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t filename[_MAX_PATH];
data/mozjs78-78.4.0/build/win32/crashinject.cpp:37:3:  [2] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
  wcscpy(slash, L"crashinjectdll.dll");
data/mozjs78-78.4.0/config/nsinstall.c:121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ], *bp;
data/mozjs78-78.4.0/config/nsinstall.c:127:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fromfd = open(name, O_RDONLY);
data/mozjs78-78.4.0/config/nsinstall.c:132:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      tofd = open(toname, O_CREAT | O_WRONLY, 0666);
data/mozjs78-78.4.0/config/nsinstall.c:139:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    tofd = open(toname, O_CREAT | O_WRONLY, 0666);
data/mozjs78-78.4.0/config/nsinstall.c:233:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *linkprefix, *owner, *group, *cp, *cwd, *todir, *toname, *name, *base,
data/mozjs78-78.4.0/config/pathsub.c:125:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[NAME_MAX];
data/mozjs78-78.4.0/config/pathsub.c:141:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(outpath + len, "../");
data/mozjs78-78.4.0/config/pathsub.c:154:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[NAME_MAX];
data/mozjs78-78.4.0/intl/icu/source/common/brkiter.cpp:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fnbuff[256];
data/mozjs78-78.4.0/intl/icu/source/common/brkiter.cpp:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ext[4]={'\0'};
data/mozjs78-78.4.0/intl/icu/source/common/brkiter.cpp:411:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lbType[kKeyValueLenMax];
data/mozjs78-78.4.0/intl/icu/source/common/brkiter.cpp:433:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char lbKeyValue[kKeyValueLenMax] = {0};
data/mozjs78-78.4.0/intl/icu/source/common/brkiter.cpp:451:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char ssKeyValue[kKeyValueLenMax] = {0};
data/mozjs78-78.4.0/intl/icu/source/common/bytesinkutil.cpp:24:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char scratch[200];
data/mozjs78-78.4.0/intl/icu/source/common/bytesinkutil.cpp:72:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s8[U8_MAX_LENGTH];
data/mozjs78-78.4.0/intl/icu/source/common/bytesinkutil.cpp:92:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s8[2] = { (char)getTwoByteLead(c), (char)getTwoByteTrail(c) };
data/mozjs78-78.4.0/intl/icu/source/common/bytestriebuilder.cpp:432:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char intBytes[5];
data/mozjs78-78.4.0/intl/icu/source/common/bytestriebuilder.cpp:478:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char intBytes[5];
data/mozjs78-78.4.0/intl/icu/source/common/cmemory.h:40:62:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define uprv_memcpy(dst, src, size) U_STANDARD_CPP_NAMESPACE memcpy(dst, src, size)
data/mozjs78-78.4.0/intl/icu/source/common/cmemory.h:96:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    alignas(type) static char storage[sizeof(type)]; \
data/mozjs78-78.4.0/intl/icu/source/common/cstr.cpp:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[2];
data/mozjs78-78.4.0/intl/icu/source/common/cstring.cpp:159:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      tbuf[30];
data/mozjs78-78.4.0/intl/icu/source/common/cstring.cpp:197:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      tbuf[30];
data/mozjs78-78.4.0/intl/icu/source/common/filteredbrk.cpp:33:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[2048];
data/mozjs78-78.4.0/intl/icu/source/common/filteredbrk.cpp:37:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(buf,"NULL");
data/mozjs78-78.4.0/intl/icu/source/common/icuplug.cpp:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char libName[UPLUG_NAME_MAX];   /**< library name */
data/mozjs78-78.4.0/intl/icu/source/common/icuplug.cpp:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sym[UPLUG_NAME_MAX];        /**< plugin symbol, or NULL */
data/mozjs78-78.4.0/intl/icu/source/common/icuplug.cpp:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char config[UPLUG_NAME_MAX];     /**< configuration data */
data/mozjs78-78.4.0/intl/icu/source/common/icuplug.cpp:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[UPLUG_NAME_MAX];   /**< name of plugin */
data/mozjs78-78.4.0/intl/icu/source/common/icuplug.cpp:112:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[UPLUG_NAME_MAX]; /**< library name */
data/mozjs78-78.4.0/intl/icu/source/common/icuplug.cpp:707:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char plugin_file[2048] = "";
data/mozjs78-78.4.0/intl/icu/source/common/icuplug.cpp:799:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        f = fopen(pluginFile.data(), "r");
data/mozjs78-78.4.0/intl/icu/source/common/icuplug.cpp:803:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char linebuf[1024];
data/mozjs78-78.4.0/intl/icu/source/common/locdispnames.cpp:355:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localeBuffer[ULOC_FULLNAME_CAPACITY*4];
data/mozjs78-78.4.0/intl/icu/source/common/locdispnames.cpp:808:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char keywordValue[ULOC_FULLNAME_CAPACITY*4];
data/mozjs78-78.4.0/intl/icu/source/common/locdspnm.cpp:590:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/locdspnm.cpp:661:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[ULOC_KEYWORD_AND_VALUES_CAPACITY]; // sigh, no ULOC_VALUE_CAPACITY
data/mozjs78-78.4.0/intl/icu/source/common/locid.cpp:560:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *field[5] = {0};
data/mozjs78-78.4.0/intl/icu/source/common/locid.cpp:1417:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char keywords[256];
data/mozjs78-78.4.0/intl/icu/source/common/locid.cpp:1446:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char keywords[256];
data/mozjs78-78.4.0/intl/icu/source/common/loclikely.cpp:202:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tagBuffer[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/loclikely.cpp:224:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char alternateLang[ULOC_LANG_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/loclikely.cpp:265:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char alternateScript[ULOC_SCRIPT_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/loclikely.cpp:302:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char alternateRegion[ULOC_COUNTRY_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/loclikely.cpp:570:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char likelySubtagsBuffer[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/loclikely.cpp:833:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lang[ULOC_LANG_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/loclikely.cpp:835:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char script[ULOC_SCRIPT_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/loclikely.cpp:837:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char region[ULOC_COUNTRY_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/loclikely.cpp:915:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lang[ULOC_LANG_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/loclikely.cpp:917:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char script[ULOC_SCRIPT_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/loclikely.cpp:919:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char region[ULOC_COUNTRY_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/loclikely.cpp:1200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localeBuffer[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/loclikely.cpp:1240:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localeBuffer[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/loclikely.cpp:1256:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char script[8];
data/mozjs78-78.4.0/intl/icu/source/common/loclikely.cpp:1263:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char lang[8];
data/mozjs78-78.4.0/intl/icu/source/common/loclikely.cpp:1316:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char rgBuf[ULOC_RG_BUFLEN];
data/mozjs78-78.4.0/intl/icu/source/common/locmap.cpp:1059:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char locName[LOCALE_NAME_MAX_LENGTH] = {};
data/mozjs78-78.4.0/intl/icu/source/common/locmap.cpp:1170:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char collVal[ULOC_KEYWORDS_CAPACITY] = {};
data/mozjs78-78.4.0/intl/icu/source/common/locmap.cpp:1171:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char baseName[ULOC_FULLNAME_CAPACITY] = {};
data/mozjs78-78.4.0/intl/icu/source/common/locmap.cpp:1196:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char asciiBCP47Tag[LOCALE_NAME_MAX_LENGTH] = {};
data/mozjs78-78.4.0/intl/icu/source/common/locmap.cpp:1203:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t bcp47Tag[LOCALE_NAME_MAX_LENGTH] = {};
data/mozjs78-78.4.0/intl/icu/source/common/locresdata.cpp:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char explicitFallbackName[ULOC_FULLNAME_CAPACITY] = {0};
data/mozjs78-78.4.0/intl/icu/source/common/locresdata.cpp:160:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char localeBuffer[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/locutil.cpp:171:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[BUFLEN];
data/mozjs78-78.4.0/intl/icu/source/common/messagepattern.cpp:982:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char numberChars[128];
data/mozjs78-78.4.0/intl/icu/source/common/normalizer2impl.cpp:139:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[U8_MAX_LENGTH];
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:720:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char gTimeZoneBuffer[PATH_MAX];
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:894:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bufferFile[MAX_READ_SIZE];
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:898:36:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        tzInfo->defaultTZFilePtr = fopen(defaultTZFileName, "r");
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:900:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    file = fopen(TZFileName, "r");
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1322:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t windowsPath[MAX_PATH];
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1323:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char windowsPathUtf8[MAX_PATH];
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1363:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char datadir_path_buffer[PATH_MAX];
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1413:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char datadir_path_buffer[MAX_PATH];
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1463:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char timezonefilesdir_path_buffer[PATH_MAX];
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1472:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char datadir_path_buffer[MAX_PATH];
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1744:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char modifiedWindowsLocale[LOCALE_NAME_MAX_LENGTH] = {};
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:1799:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char correctedLocale[64];
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:2026:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localeBuf[100];
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:2050:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char codepage[64];
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:2066:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(codepage,"ibm-%d", ccsid);
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:2070:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char codepage[64];
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:2079:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char codepage[64];
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:2103:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(codepage, "windows-%ld", codepageNumber);
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:2110:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char codesetName[100];
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:2213:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char versionChars[U_MAX_VERSION_STRING_LENGTH+1];
data/mozjs78-78.4.0/intl/icu/source/common/rbbidata.h:129:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             fTableData[1]; /*  First RBBIStateTableRow begins here.              */
data/mozjs78-78.4.0/intl/icu/source/common/servrbf.cpp:62:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char pkg[20];
data/mozjs78-78.4.0/intl/icu/source/common/static_unicode_sets.cpp:31:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char gEmptyUnicodeSet[sizeof(UnicodeSet)];
data/mozjs78-78.4.0/intl/icu/source/common/ucasemap_imp.h:118:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char locale[32];
data/mozjs78-78.4.0/intl/icu/source/common/ucat.cpp:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char key[MAX_KEY_LEN];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv.cpp:97:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char asciiName[UCNV_MAX_CONVERTER_NAME_LENGTH];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv.cpp:140:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char myName[UCNV_MAX_CONVERTER_NAME_LENGTH];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv.cpp:478:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    alignas(UConverter) char cloneBuffer[U_CNV_SAFECLONE_BUFFERSIZE];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv.cpp:479:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char chars[UCNV_ERROR_BUFFER_LENGTH];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv.cpp:688:34:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                ccsid = (int32_t)atol(ccsidStr+1);  /* +1 to skip '-' */
data/mozjs78-78.4.0/intl/icu/source/common/ucnv.cpp:1282:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char replay[UCNV_EXT_MAX_BYTES];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv.cpp:1755:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buffer[1024];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv.cpp:2445:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char targetBuffer[CHUNK_SIZE];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv.cpp:2756:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char start[SIG_MAX_LEN]={ '\xa5', '\xa5', '\xa5', '\xa5', '\xa5' };
data/mozjs78-78.4.0/intl/icu/source/common/ucnv2022.cpp:220:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[30];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv2022.cpp:221:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char locale[3];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv2022.cpp:481:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char myLocale[7]={' ',' ',' ',' ',' ',' ', '\0'};
data/mozjs78-78.4.0/intl/icu/source/common/ucnv2022.cpp:1561:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
_2022ToSJIS(uint8_t c1, uint8_t c2, char bytes[2]) {
data/mozjs78-78.4.0/intl/icu/source/common/ucnv2022.cpp:1674:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[8];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv2022.cpp:2083:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tempBuf[2];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv2022.cpp:2676:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tempBuf[2];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv2022.cpp:2926:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[8];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv2022.cpp:3269:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tempBuf[3];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv2022.cpp:3474:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[8];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_bld.cpp:208:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char gDefaultConverterNameBuffer[UCNV_MAX_CONVERTER_NAME_LENGTH + 1]; /* +1 for NULL */
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_bld.cpp:388:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strippedName[UCNV_MAX_CONVERTER_NAME_LENGTH];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_bld.cpp:1016:37:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if(mySharedConverterData->impl->open != NULL) {
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_bld.cpp:1017:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        mySharedConverterData->impl->open(myUConverter, pArgs, err);
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_bld.h:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name 
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_bld.h:223:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char invalidCharBuffer[UCNV_MAX_CHAR_LEN];          /* bytes from last error/callback situation */
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_bld.h:235:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char preToU[UCNV_EXT_MAX_BYTES];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_cnv.h:238:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    UConverterOpen open;
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_imp.h:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cnvName[UCNV_MAX_CONVERTER_NAME_LENGTH];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_imp.h:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char locale[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_io.cpp:557:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strippedName[UCNV_MAX_CONVERTER_NAME_LENGTH];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_io.cpp:1127:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strippedLeft[UCNV_MAX_CONVERTER_NAME_LENGTH],
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_lmb.cpp:237:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const OptGroupByteToCPName[ULMBCS_GRP_LAST + 1] = {
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_lmb.cpp:1215:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char bytes[2];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_lmb.cpp:1266:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char LMBCS [ULMBCS_CHARSIZE_MAX];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_u16.cpp:61:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char overflow[4];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_u16.cpp:662:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char overflow[4];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_u32.cpp:222:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char temp[sizeof(uint32_t)];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_u32.cpp:325:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char temp[sizeof(uint32_t)];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_u32.cpp:700:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char temp[sizeof(uint32_t)];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_u32.cpp:810:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char temp[sizeof(uint32_t)];
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_u32.cpp:1046:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char utf32BOM[8]={ 0, 0, (char)0xfeu, (char)0xffu, (char)0xffu, (char)0xfeu, 0, 0 };
data/mozjs78-78.4.0/intl/icu/source/common/ucnvhz.cpp:158:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tempBuf[2];
data/mozjs78-78.4.0/intl/icu/source/common/ucnvhz.cpp:504:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[4];
data/mozjs78-78.4.0/intl/icu/source/common/ucnvisci.cpp:132:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[sizeof(ISCII_CNV_PREFIX) + 1];
data/mozjs78-78.4.0/intl/icu/source/common/ucnvmbcs.cpp:1138:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char bytes[4];
data/mozjs78-78.4.0/intl/icu/source/common/ucnvmbcs.cpp:5656:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[4];
data/mozjs78-78.4.0/intl/icu/source/common/ucnvsel.cpp:553:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    (char **)uprv_malloc(
data/mozjs78-78.4.0/intl/icu/source/common/ucnvsel.cpp:713:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(en.getAlias(), &defaultEncodings, sizeof(UEnumeration));
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:215:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[200];
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:314:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[ISO_CURRENCY_CODE_LENGTH+1];
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:374:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  id[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:462:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char id[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:521:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char currency[4];  // ISO currency codes are alpha3 codes.
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:534:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char id[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:670:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:677:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[ISO_CURRENCY_CODE_LENGTH+1];
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:756:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:763:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[ISO_CURRENCY_CODE_LENGTH+1];
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:869:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char locale[ULOC_FULLNAME_CAPACITY] = "";
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:944:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[ULOC_FULLNAME_CAPACITY] = "";
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:1092:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char curNameBuf[1024];
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:1102:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char curNameBuf[1024];
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:1334:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char locale[ULOC_FULLNAME_CAPACITY];  //key
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:2261:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char id[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:2377:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char id[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:2525:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prefRegion[ULOC_COUNTRY_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:2542:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(en, &defaultKeywordValues, sizeof(UEnumeration));
data/mozjs78-78.4.0/intl/icu/source/common/ucurr.cpp:2673:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char alphaCode[ISO_CURRENCY_CODE_LENGTH+1];
data/mozjs78-78.4.0/intl/icu/source/common/udata.cpp:782:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ourPathBuffer[1024];
data/mozjs78-78.4.0/intl/icu/source/common/uloc.cpp:591:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char keyword[ULOC_KEYWORD_BUFFER_LEN];
data/mozjs78-78.4.0/intl/icu/source/common/uloc.cpp:764:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char keywordNameBuffer[ULOC_KEYWORD_BUFFER_LEN];
data/mozjs78-78.4.0/intl/icu/source/common/uloc.cpp:765:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localeKeywordNameBuffer[ULOC_KEYWORD_BUFFER_LEN];
data/mozjs78-78.4.0/intl/icu/source/common/uloc.cpp:769:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tempBuffer[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uloc.cpp:886:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char keywordNameBuffer[ULOC_KEYWORD_BUFFER_LEN];
data/mozjs78-78.4.0/intl/icu/source/common/uloc.cpp:887:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char keywordValueBuffer[ULOC_KEYWORDS_CAPACITY+1];
data/mozjs78-78.4.0/intl/icu/source/common/uloc.cpp:888:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localeKeywordNameBuffer[ULOC_KEYWORD_BUFFER_LEN];
data/mozjs78-78.4.0/intl/icu/source/common/uloc.cpp:1470:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char keywords[256];
data/mozjs78-78.4.0/intl/icu/source/common/uloc.cpp:1472:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tempBuffer[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uloc.cpp:1542:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tempBuffer[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uloc.cpp:1825:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tempBuffer[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uloc.cpp:1992:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lang[ULOC_LANG_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uloc.cpp:2012:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cntry[ULOC_LANG_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uloc.cpp:2033:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       langID[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uloc.cpp:2061:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char collVal[ULOC_KEYWORDS_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uloc.cpp:2062:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmpLocaleID[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uloc_tag.cpp:50:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char          *extlang[MAXEXTLANG];
data/mozjs78-78.4.0/intl/icu/source/common/uloc_tag.cpp:995:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[ULOC_LANG_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uloc_tag.cpp:1043:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[ULOC_SCRIPT_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uloc_tag.cpp:1075:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[ULOC_COUNTRY_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uloc_tag.cpp:1128:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uloc_tag.cpp:1245:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char attrBuf[ULOC_KEYWORD_AND_VALUES_CAPACITY] = { 0 };
data/mozjs78-78.4.0/intl/icu/source/common/uloc_tag.cpp:1548:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char attrBuf[ULOC_KEYWORD_AND_VALUES_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uloc_tag.cpp:1684:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char bcpKeyBuf[3];          /* BCP key length is always 2 for now */
data/mozjs78-78.4.0/intl/icu/source/common/uloc_tag.cpp:1722:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char bcpTypeBuf[128];       /* practically long enough even considering multiple subtag type */
data/mozjs78-78.4.0/intl/icu/source/common/uloc_tag.cpp:1897:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uloc_tag.cpp:1898:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpAppend[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uloc_tag.cpp:2723:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char buf[ULOC_KEYWORD_AND_VALUES_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/umapfile.cpp:148:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t utf16Path[MAX_PATH];
data/mozjs78-78.4.0/intl/icu/source/common/umapfile.cpp:232:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd=open(path, O_RDONLY);
data/mozjs78-78.4.0/intl/icu/source/common/umapfile.cpp:299:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        file=fopen(path, "rb");
data/mozjs78-78.4.0/intl/icu/source/common/umapfile.cpp:424:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char pathBuffer[1024];
data/mozjs78-78.4.0/intl/icu/source/common/umapfile.cpp:455:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            fd=open(path, O_RDONLY);
data/mozjs78-78.4.0/intl/icu/source/common/umutablecptrie.cpp:1043:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[UCPTRIE_FAST_DATA_BLOCK_LENGTH * 3 + 3];
data/mozjs78-78.4.0/intl/icu/source/common/umutex.h:243:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    alignas(std::mutex) char fStorage[sizeof(std::mutex)] {};
data/mozjs78-78.4.0/intl/icu/source/common/unames.cpp:127:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const charCatNames[U_CHAR_EXTENDED_CATEGORY_COUNT] = {
data/mozjs78-78.4.0/intl/icu/source/common/unames.cpp:608:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[200];
data/mozjs78-78.4.0/intl/icu/source/common/unames.cpp:648:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[200];
data/mozjs78-78.4.0/intl/icu/source/common/unames.cpp:777:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  const char *elementBases[8], const char *elements[8],
data/mozjs78-78.4.0/intl/icu/source/common/unames.cpp:777:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  const char *elementBases[8], const char *elements[8],
data/mozjs78-78.4.0/intl/icu/source/common/unames.cpp:940:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[200];
data/mozjs78-78.4.0/intl/icu/source/common/unames.cpp:994:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        const char *elementBases[8], *elements[8];
data/mozjs78-78.4.0/intl/icu/source/common/unames.cpp:1121:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[64];
data/mozjs78-78.4.0/intl/icu/source/common/unames.cpp:1123:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        const char *elementBases[8], *elements[8];
data/mozjs78-78.4.0/intl/icu/source/common/unames.cpp:1522:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char upper[120] = {0};
data/mozjs78-78.4.0/intl/icu/source/common/unames.cpp:1523:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lower[120] = {0};
data/mozjs78-78.4.0/intl/icu/source/common/unames.cpp:1720:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cs[256];
data/mozjs78-78.4.0/intl/icu/source/common/unicode/brkiter.h:650:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char actualLocale[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/unicode/brkiter.h:651:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char validLocale[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/unicode/localebuilder.h:300:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char language_[9];
data/mozjs78-78.4.0/intl/icu/source/common/unicode/localebuilder.h:301:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char script_[5];
data/mozjs78-78.4.0/intl/icu/source/common/unicode/localebuilder.h:302:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char region_[4];
data/mozjs78-78.4.0/intl/icu/source/common/unicode/locid.h:1140:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char language[ULOC_LANG_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/unicode/locid.h:1141:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char script[ULOC_SCRIPT_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/unicode/locid.h:1142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char country[ULOC_COUNTRY_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/unicode/locid.h:1145:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fullNameBuffer[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/unicode/strenum.h:222:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char charsBuffer[32];
data/mozjs78-78.4.0/intl/icu/source/common/unifiedcache.cpp:197:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[256];
data/mozjs78-78.4.0/intl/icu/source/common/uniset.cpp:104:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[40];
data/mozjs78-78.4.0/intl/icu/source/common/uniset.cpp:112:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[40];
data/mozjs78-78.4.0/intl/icu/source/common/uniset_props.cpp:920:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char buf[128]; // it suffices that this be > uprv_getMaxCharNameLength
data/mozjs78-78.4.0/intl/icu/source/common/uniset_props.cpp:938:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char buf[128];
data/mozjs78-78.4.0/intl/icu/source/common/unistr.cpp:972:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stackBuffer[1024];
data/mozjs78-78.4.0/intl/icu/source/common/unistr_cnv.cpp:283:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[1024];
data/mozjs78-78.4.0/intl/icu/source/common/ures_cnv.cpp:34:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathBuffer[1024];
data/mozjs78-78.4.0/intl/icu/source/common/uresbund.cpp:310:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char aliasName[100] = { 0 };
data/mozjs78-78.4.0/intl/icu/source/common/uresbund.cpp:639:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uresbund.cpp:640:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char usrDataPath[96];
data/mozjs78-78.4.0/intl/icu/source/common/uresbund.cpp:803:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char name[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uresbund.cpp:972:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char stackAlias[200];
data/mozjs78-78.4.0/intl/icu/source/common/uresbund.cpp:1120:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                            char stackPath[URES_MAX_BUFFER_SIZE];
data/mozjs78-78.4.0/intl/icu/source/common/uresbund.cpp:1232:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[256];
data/mozjs78-78.4.0/intl/icu/source/common/uresbund.cpp:2287:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char canonLocaleID[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uresbund.cpp:2610:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char kwVal[1024] = ""; /* value of keyword 'keyword' */
data/mozjs78-78.4.0/intl/icu/source/common/uresbund.cpp:2611:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char defVal[1024] = ""; /* default value for given locale */
data/mozjs78-78.4.0/intl/icu/source/common/uresbund.cpp:2612:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char defLoc[1024] = ""; /* default value for given locale */
data/mozjs78-78.4.0/intl/icu/source/common/uresbund.cpp:2613:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char base[1024] = ""; /* base locale */
data/mozjs78-78.4.0/intl/icu/source/common/uresbund.cpp:2614:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char found[1024] = "";
data/mozjs78-78.4.0/intl/icu/source/common/uresbund.cpp:2615:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char parent[1024] = "";
data/mozjs78-78.4.0/intl/icu/source/common/uresbund.cpp:2616:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char full[1024] = "";
data/mozjs78-78.4.0/intl/icu/source/common/uresbund.cpp:2916:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       valuesBuf[VALUES_BUF_SIZE];
data/mozjs78-78.4.0/intl/icu/source/common/uresbund.cpp:2918:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *valuesList[VALUES_LIST_SIZE];
data/mozjs78-78.4.0/intl/icu/source/common/uresimp.h:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fNameBuffer[3]; /* A small buffer of free space for fName. The free space is due to struct padding. */
data/mozjs78-78.4.0/intl/icu/source/common/uresimp.h:74:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fResBuf[RES_BUFSIZE];
data/mozjs78-78.4.0/intl/icu/source/common/uscript.cpp:61:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lang[8] = {0};
data/mozjs78-78.4.0/intl/icu/source/common/uscript.cpp:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char script[8] = {0};
data/mozjs78-78.4.0/intl/icu/source/common/ustr_wcs.cpp:72:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stackBuffer [_STACK_BUFFER_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/ustr_wcs.cpp:298:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t wStack[_STACK_BUFFER_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/ustr_wcs.cpp:302:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cStack[_STACK_BUFFER_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/common/uts46.cpp:430:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char stackArray[256];
data/mozjs78-78.4.0/intl/icu/source/common/utypes.cpp:22:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const
data/mozjs78-78.4.0/intl/icu/source/common/utypes.cpp:35:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const
data/mozjs78-78.4.0/intl/icu/source/common/utypes.cpp:74:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const
data/mozjs78-78.4.0/intl/icu/source/common/utypes.cpp:109:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const
data/mozjs78-78.4.0/intl/icu/source/common/utypes.cpp:133:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const
data/mozjs78-78.4.0/intl/icu/source/common/utypes.cpp:151:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const
data/mozjs78-78.4.0/intl/icu/source/common/utypes.cpp:177:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const
data/mozjs78-78.4.0/intl/icu/source/common/utypes.cpp:190:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const
data/mozjs78-78.4.0/intl/icu/source/common/wintz.cpp:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dynamicTZKeyName[MAX_TIMEZONE_ID_LENGTH];
data/mozjs78-78.4.0/intl/icu/source/common/wintz.cpp:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpid[MAX_TIMEZONE_ID_LENGTH];
data/mozjs78-78.4.0/intl/icu/source/common/wintz.cpp:57:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t ISOcodeW[3] = {}; /* 2 letter ISO code in UTF-16 */
data/mozjs78-78.4.0/intl/icu/source/common/wintz.cpp:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ISOcode[3] = {}; /* 2 letter ISO code in UTF-8 */
data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uconv.cpp:86:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char dataPath[2048];        /* XXX Sloppy: should be PATH_MAX. */
data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uconv.cpp:512:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[20];
data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uconv.cpp:623:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        infile = fopen(infilestr, "rb");
data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uconv.cpp:792:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char pos[32], errorBytes[32];
data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uconv.cpp:807:29:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    (int8_t)sprintf(pos, "%d",
data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uconv.cpp:944:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char pos[32];
data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uconv.cpp:988:38:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    length = (int8_t)sprintf(pos, "%u", (int)ferroffset);
data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uconv.cpp:1182:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                bufsz = atoi(*iter);
data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uconv.cpp:1326:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        outfile = fopen(outfilestr, "wb");
data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uwmsg.c:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf [BUF_SIZE];
data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uwmsg.c:151:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(result, msg, msgLen * U_SIZEOF_UCHAR);
data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uwmsg.c:152:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(result + msgLen, gNoFormatting, resultLength);
data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uwmsg.c:250:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char error[128];
data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uwmsg.c:253:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(error, "UNDOCUMENTED ICU ERROR %d", err);
data/mozjs78-78.4.0/intl/icu/source/i18n/anytrans.cpp:336:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/mozjs78-78.4.0/intl/icu/source/i18n/astro.cpp:46:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char gStrBuf[1024];
data/mozjs78-78.4.0/intl/icu/source/i18n/astro.cpp:1483:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[800];
data/mozjs78-78.4.0/intl/icu/source/i18n/astro.cpp:1484:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(tmp, "[%.5f,%.5f]", longitude*RAD_DEG, latitude*RAD_DEG);
data/mozjs78-78.4.0/intl/icu/source/i18n/astro.cpp:1494:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[400];
data/mozjs78-78.4.0/intl/icu/source/i18n/astro.cpp:1495:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(tmp, "%f,%f",
data/mozjs78-78.4.0/intl/icu/source/i18n/astro.cpp:1506:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[800];
data/mozjs78-78.4.0/intl/icu/source/i18n/astro.cpp:1507:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(tmp, "[%.5f,%.5f]", altitude*RAD_DEG, azimuth*RAD_DEG);
data/mozjs78-78.4.0/intl/icu/source/i18n/bocsu.cpp:102:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char scratch[64];
data/mozjs78-78.4.0/intl/icu/source/i18n/calendar.cpp:267:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char canonicalName[256];
data/mozjs78-78.4.0/intl/icu/source/i18n/calendar.cpp:279:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char calTypeBuf[32];
data/mozjs78-78.4.0/intl/icu/source/i18n/calendar.cpp:294:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char region[ULOC_COUNTRY_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/calendar.cpp:455:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char keyword[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/calendar.cpp:940:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char tmp[200];
data/mozjs78-78.4.0/intl/icu/source/i18n/calendar.cpp:961:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char keyword[ULOC_FULLNAME_CAPACITY] = "";
data/mozjs78-78.4.0/intl/icu/source/i18n/calendar.cpp:3852:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char region[ULOC_COUNTRY_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/choicfmt.cpp:174:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp[DBL_DIG + 16];
data/mozjs78-78.4.0/intl/icu/source/i18n/choicfmt.cpp:178:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(temp, "%.*g", DBL_DIG, value);
data/mozjs78-78.4.0/intl/icu/source/i18n/coll.cpp:294:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *collReorderCodes[UCOL_REORDER_CODE_LIMIT - UCOL_REORDER_CODE_FIRST] = {
data/mozjs78-78.4.0/intl/icu/source/i18n/coll.cpp:326:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[1024];  // The reordering value could be long.
data/mozjs78-78.4.0/intl/icu/source/i18n/coll.cpp:904:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/collationkeys.cpp:336:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buffer[3] = { p2, (char)(p >> 8), (char)p };
data/mozjs78-78.4.0/intl/icu/source/i18n/collationruleparser.cpp:607:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char localeID[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/collationruleparser.cpp:618:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char baseID[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/collationruleparser.cpp:632:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char collationType[ULOC_KEYWORDS_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/csdetect.cpp:449:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(en, &gCSDetEnumeration, sizeof(UEnumeration));
data/mozjs78-78.4.0/intl/icu/source/i18n/csdetect.cpp:472:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(en, &gCSDetEnumeration, sizeof(UEnumeration));
data/mozjs78-78.4.0/intl/icu/source/i18n/currpinf.cpp:350:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char result_1[1000];
data/mozjs78-78.4.0/intl/icu/source/i18n/currunit.cpp:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char simpleIsoCode[4];
data/mozjs78-78.4.0/intl/icu/source/i18n/currunit.cpp:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char isoCodeBuffer[4];
data/mozjs78-78.4.0/intl/icu/source/i18n/currunit.cpp:101:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char simpleIsoCode[4];
data/mozjs78-78.4.0/intl/icu/source/i18n/datefmt.cpp:507:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[8];
data/mozjs78-78.4.0/intl/icu/source/i18n/dayperiodrules.cpp:344:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/dayperiodrules.cpp:345:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char parentName[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/dcfmtsym.cpp:66:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *gNumberElementKeys[DecimalFormatSymbols::kFormatSymbolCount] = {
data/mozjs78-78.4.0/intl/icu/source/i18n/dcfmtsym.cpp:534:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cc[4]={0};
data/mozjs78-78.4.0/intl/icu/source/i18n/decNumber.cpp:3675:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(c,   "Inf");
data/mozjs78-78.4.0/intl/icu/source/i18n/decNumber.cpp:3676:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(c+3, "inity");
data/mozjs78-78.4.0/intl/icu/source/i18n/decNumber.cpp:3683:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(c, "NaN");
data/mozjs78-78.4.0/intl/icu/source/i18n/decNumberLocal.h:124:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  #define UBTOUS(b)  (memcpy((void *)&uswork, b, 2), uswork)
data/mozjs78-78.4.0/intl/icu/source/i18n/decNumberLocal.h:125:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  #define UBTOUI(b)  (memcpy((void *)&uiwork, b, 4), uiwork)
data/mozjs78-78.4.0/intl/icu/source/i18n/decNumberLocal.h:130:40:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  #define UBFROMUS(b, i)  (uswork=(i), memcpy(b, (void *)&uswork, 2), uswork)
data/mozjs78-78.4.0/intl/icu/source/i18n/decNumberLocal.h:131:40:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  #define UBFROMUI(b, i)  (uiwork=(i), memcpy(b, (void *)&uiwork, 4), uiwork)
data/mozjs78-78.4.0/intl/icu/source/i18n/decNumberLocal.h:461:31:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    #define dpd2bcd8(u, dpd)  memcpy(u, &DPD2BCD8[((dpd)&0x3ff)*4], 4)
data/mozjs78-78.4.0/intl/icu/source/i18n/decNumberLocal.h:462:31:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    #define dpd2bcd83(u, dpd) memcpy(u, &DPD2BCD8[((dpd)&0x3ff)*4], 3)
data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-double-to-string.cpp:117:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[kMaxExponentLength + 1];
data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-double-to-string.cpp:194:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char decimal_rep[kDecimalRepCapacity];
data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-double-to-string.cpp:239:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char decimal_rep[kDecimalRepCapacity];
data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-double-to-string.cpp:272:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char decimal_rep[kDecimalRepCapacity];
data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-double-to-string.cpp:327:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char decimal_rep[kDecimalRepCapacity];
data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-string-to-double.cpp:575:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  DOUBLE_CONVERSION_STACK_UNINITIALIZED char
data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-strtod.cpp:509:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char copy_buffer[kMaxSignificantDecimalDigits];
data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-strtod.cpp:542:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char copy_buffer[kMaxSignificantDecimalDigits];
data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-utils.h:370:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  typedef char VerifySizesAreEqual[sizeof(Dest) == sizeof(Source) ? 1 : -1];
data/mozjs78-78.4.0/intl/icu/source/i18n/dtfmtsym.cpp:179:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char type[256];
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvfmt.cpp:99:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[1000];
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvfmt.cpp:100:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result_1[1000];
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvfmt.cpp:101:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mesg[2000];
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvfmt.cpp:721:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[1000];
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvfmt.cpp:722:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result_1[1000];
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvfmt.cpp:723:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mesg[2000];
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvfmt.cpp:767:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[1000];
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvfmt.cpp:768:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result_1[1000];
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvfmt.cpp:769:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mesg[2000];
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvinf.cpp:398:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         calendarType[ULOC_KEYWORDS_CAPACITY]; // to be filled in with the type to use, if all goes well
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvinf.cpp:399:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         localeWithCalendarKey[ULOC_LOCALE_IDENTIFIER_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvinf.cpp:561:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[1000];
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvinf.cpp:562:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result_1[1000];
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvinf.cpp:563:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mesg[2000];
data/mozjs78-78.4.0/intl/icu/source/i18n/dtptngen.cpp:661:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[8];
data/mozjs78-78.4.0/intl/icu/source/i18n/dtptngen.cpp:869:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char localeWithCalendarKey[ULOC_LOCALE_IDENTIFIER_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/dtptngen.cpp:883:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char calendarType[ULOC_KEYWORDS_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/dtptngen.cpp:1503:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cldrFieldKey[UDATPG_FIELD_KEY_MAX + 1];
data/mozjs78-78.4.0/intl/icu/source/i18n/gender.cpp:151:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char parentLocaleName[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/gender.cpp:163:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char type_str[256] = "";
data/mozjs78-78.4.0/intl/icu/source/i18n/listformatter.cpp:407:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char aliasedStyle[kStyleLenMax+1];
data/mozjs78-78.4.0/intl/icu/source/i18n/listformatter.cpp:412:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char aliasedStyle[kStyleLenMax+1] = {0};
data/mozjs78-78.4.0/intl/icu/source/i18n/listformatter.cpp:478:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char currentStyle[kStyleLenMax+1];
data/mozjs78-78.4.0/intl/icu/source/i18n/nfrs.cpp:742:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char ubstr[64];
data/mozjs78-78.4.0/intl/icu/source/i18n/nfrs.cpp:744:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char ubstrhex[64];
data/mozjs78-78.4.0/intl/icu/source/i18n/number_decimalquantity.cpp:487:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[DoubleToStringConverter::kBase10MaximalLength + 1];
data/mozjs78-78.4.0/intl/icu/source/i18n/number_decimalquantity.cpp:1332:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer8[100];
data/mozjs78-78.4.0/intl/icu/source/i18n/number_decimfmtprops.cpp:19:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char kRawDefaultProperties[sizeof(DecimalFormatProperties)];
data/mozjs78-78.4.0/intl/icu/source/i18n/number_microprops.h:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char nsName[9];
data/mozjs78-78.4.0/intl/icu/source/i18n/number_rounding.cpp:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[DoubleToStringConverter::kBase10MaximalLength + 1];
data/mozjs78-78.4.0/intl/icu/source/i18n/number_utils.cpp:140:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[DoubleToStringConverter::kBase10MaximalLength + 6];
data/mozjs78-78.4.0/intl/icu/source/i18n/numfmt.cpp:65:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[2000];
data/mozjs78-78.4.0/intl/icu/source/i18n/numfmt.cpp:1038:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char cfKeyValue[kKeyValueLenMax] = {0};
data/mozjs78-78.4.0/intl/icu/source/i18n/numfmt.cpp:1327:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[8];
data/mozjs78-78.4.0/intl/icu/source/i18n/numsys.cpp:121:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[ULOC_KEYWORDS_CAPACITY] = "";
data/mozjs78-78.4.0/intl/icu/source/i18n/plurrule.cpp:712:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char parentLocaleName[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/plurrule.cpp:731:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char setKey[256];
data/mozjs78-78.4.0/intl/icu/source/i18n/plurrule.cpp:1131:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char digits[128];
data/mozjs78-78.4.0/intl/icu/source/i18n/plurrule.cpp:1136:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return((int32_t)atoi(digits));
data/mozjs78-78.4.0/intl/icu/source/i18n/plurrule.cpp:1629:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  buf[30] = {0};
data/mozjs78-78.4.0/intl/icu/source/i18n/plurrule.cpp:1630:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "%1.15e", n);
data/mozjs78-78.4.0/intl/icu/source/i18n/plurrule.cpp:1632:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int exponent = atoi(buf+18);
data/mozjs78-78.4.0/intl/icu/source/i18n/rbnf.cpp:601:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/mozjs78-78.4.0/intl/icu/source/i18n/rbnf.cpp:1044:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[64];
data/mozjs78-78.4.0/intl/icu/source/i18n/regexcmp.cpp:4217:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[100];
data/mozjs78-78.4.0/intl/icu/source/i18n/reldtfmt.cpp:494:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int32_t offset = atoi(key);
data/mozjs78-78.4.0/intl/icu/source/i18n/rulebasedcollator.cpp:1552:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char resultLocale[ULOC_FULLNAME_CAPACITY + 1];
data/mozjs78-78.4.0/intl/icu/source/i18n/rulebasedcollator.cpp:1561:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char subtag[ULOC_KEYWORD_AND_VALUES_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/scriptset.cpp:226:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[40];
data/mozjs78-78.4.0/intl/icu/source/i18n/smpdtfmt.cpp:1339:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char kw[ULOC_KEYWORD_AND_VALUES_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/standardplural.cpp:25:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *gKeywords[StandardPlural::COUNT] = {
data/mozjs78-78.4.0/intl/icu/source/i18n/timezone.cpp:63:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char gStrBuf[256];
data/mozjs78-78.4.0/intl/icu/source/i18n/timezone.cpp:119:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char gRawGMT[sizeof(icu::SimpleTimeZone)];
data/mozjs78-78.4.0/intl/icu/source/i18n/timezone.cpp:122:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char gRawUNKNOWN[sizeof(icu::SimpleTimeZone)];
data/mozjs78-78.4.0/intl/icu/source/i18n/timezone.cpp:127:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char TZDATA_VERSION[16];
data/mozjs78-78.4.0/intl/icu/source/i18n/timezone.cpp:259:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char key[64];
data/mozjs78-78.4.0/intl/icu/source/i18n/timezone.cpp:282:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/mozjs78-78.4.0/intl/icu/source/i18n/timezone.cpp:845:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char tzregion[4]; // max 3 letters + null term
data/mozjs78-78.4.0/intl/icu/source/i18n/timezone.cpp:1653:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char winidKey[MAX_WINDOWS_ID_SIZE];
data/mozjs78-78.4.0/intl/icu/source/i18n/tmutfmt.cpp:185:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char res[1000];
data/mozjs78-78.4.0/intl/icu/source/i18n/tmutfmt.cpp:559:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char parentLocale[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/translit.cpp:761:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char key[200];
data/mozjs78-78.4.0/intl/icu/source/i18n/tzgnames.cpp:305:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fTargetRegion[ULOC_COUNTRY_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/tzgnames.cpp:545:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char countryCode[ULOC_COUNTRY_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/tzgnames.cpp:788:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char countryCode[ULOC_COUNTRY_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/tznames_impl.cpp:749:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char key[ZID_KEY_MAX + 1];
data/mozjs78-78.4.0/intl/icu/source/i18n/tznames_impl.cpp:764:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char key[ZID_KEY_MAX + 1];
data/mozjs78-78.4.0/intl/icu/source/i18n/tznames_impl.cpp:1290:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mzIdChar[ZID_KEY_MAX + 1];
data/mozjs78-78.4.0/intl/icu/source/i18n/tznames_impl.cpp:2261:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char key[ZID_KEY_MAX + 1];
data/mozjs78-78.4.0/intl/icu/source/i18n/tznames_impl.h:258:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fRegion[ULOC_COUNTRY_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/ucal.cpp:169:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char localeBuf[ULOC_LOCALE_IDENTIFIER_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/ucal.cpp:699:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prefRegion[ULOC_COUNTRY_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/ucal.cpp:766:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(en, &defaultKeywordValues, sizeof(UEnumeration));
data/mozjs78-78.4.0/intl/icu/source/i18n/ucol_imp.h:124:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char type[16];
data/mozjs78-78.4.0/intl/icu/source/i18n/ucol_imp.h:125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char defaultType[16];
data/mozjs78-78.4.0/intl/icu/source/i18n/ucol_res.cpp:112:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char type[16];
data/mozjs78-78.4.0/intl/icu/source/i18n/ucol_res.cpp:683:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(en, &defaultKeywordValues, sizeof(UEnumeration));
data/mozjs78-78.4.0/intl/icu/source/i18n/ucol_sit.cpp:456:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[internalBufferSize];
data/mozjs78-78.4.0/intl/icu/source/i18n/ucol_sit.cpp:464:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char keyBuffer[256];
data/mozjs78-78.4.0/intl/icu/source/i18n/ucol_sit.cpp:526:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[internalBufferSize];
data/mozjs78-78.4.0/intl/icu/source/i18n/ulocdata.cpp:195:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char region[ULOC_COUNTRY_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/calendar.h:2330:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char validLocale[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/calendar.h:2331:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char actualLocale[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/dcfmtsym.h:495:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char actualLocale[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/dcfmtsym.h:496:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char validLocale[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/dtfmtsym.h:908:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char validLocale[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/dtfmtsym.h:909:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char actualLocale[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/format.h:300:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char actualLocale[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/format.h:301:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char validLocale[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/numberformatter.h:2386:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fUnsafeCallCount[8] {};  // internally cast to u_atomic_int32_t
data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/numsys.h:202:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[kInternalNumSysNameCapacity+1];
data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/region.h:194:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char id[4];
data/mozjs78-78.4.0/intl/icu/source/i18n/unicode/tzfmt.h:681:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fTargetRegion[ULOC_COUNTRY_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/vzone.cpp:61:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(url,s.getBuffer(),urlLength);
data/mozjs78-78.4.0/intl/icu/source/i18n/vzone.cpp:89:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(result,s.getBuffer(),resultLength);
data/mozjs78-78.4.0/intl/icu/source/i18n/vzone.cpp:101:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(result,s.getBuffer(),resultLength);
data/mozjs78-78.4.0/intl/icu/source/i18n/vzone.cpp:113:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(result,s.getBuffer(),resultLength);
data/mozjs78-78.4.0/intl/icu/source/i18n/windtfmt.cpp:102:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char asciiBCP47Tag[LOCALE_NAME_MAX_LENGTH] = {};
data/mozjs78-78.4.0/intl/icu/source/i18n/windtfmt.cpp:111:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t bcp47Tag[LOCALE_NAME_MAX_LENGTH] = {};
data/mozjs78-78.4.0/intl/icu/source/i18n/windtfmt.cpp:138:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t windowsLocaleName[LOCALE_NAME_MAX_LENGTH] = {};
data/mozjs78-78.4.0/intl/icu/source/i18n/windtfmt.cpp:310:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t stackBuffer[STACK_BUFFER_SIZE];
data/mozjs78-78.4.0/intl/icu/source/i18n/windtfmt.cpp:343:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t stackBuffer[STACK_BUFFER_SIZE];
data/mozjs78-78.4.0/intl/icu/source/i18n/winnmfmt.cpp:85:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t buf[10];
data/mozjs78-78.4.0/intl/icu/source/i18n/winnmfmt.cpp:112:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t buf[10];
data/mozjs78-78.4.0/intl/icu/source/i18n/winnmfmt.cpp:147:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char asciiBCP47Tag[LOCALE_NAME_MAX_LENGTH] = {};
data/mozjs78-78.4.0/intl/icu/source/i18n/winnmfmt.cpp:156:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t bcp47Tag[LOCALE_NAME_MAX_LENGTH] = {};
data/mozjs78-78.4.0/intl/icu/source/i18n/winnmfmt.cpp:183:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t windowsLocaleName[LOCALE_NAME_MAX_LENGTH] = {};
data/mozjs78-78.4.0/intl/icu/source/i18n/winnmfmt.cpp:222:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmpLocID[ULOC_FULLNAME_CAPACITY];
data/mozjs78-78.4.0/intl/icu/source/i18n/winnmfmt.cpp:339:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t nStackBuffer[STACK_BUFFER_SIZE];
data/mozjs78-78.4.0/intl/icu/source/i18n/winnmfmt.cpp:385:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t stackBuffer[STACK_BUFFER_SIZE];
data/mozjs78-78.4.0/intl/icu/source/i18n/zonemeta.cpp:278:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char id[ZID_KEY_MAX + 1];
data/mozjs78-78.4.0/intl/icu/source/i18n/zonemeta.cpp:637:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tzKey[ZID_KEY_MAX + 1];
data/mozjs78-78.4.0/intl/icu/source/i18n/zonemeta.cpp:722:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char keyBuf[ZID_KEY_MAX + 1];
data/mozjs78-78.4.0/intl/icu/source/i18n/zonemeta.cpp:917:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tzidKey[ZID_KEY_MAX + 1];
data/mozjs78-78.4.0/intl/icu/source/i18n/zrule.cpp:47:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(name, s.getBuffer(), nameLength);
data/mozjs78-78.4.0/intl/icu/source/i18n/zrule.cpp:98:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(name, s.getBuffer(), nameLength);
data/mozjs78-78.4.0/intl/icu/source/io/ufile.cpp:129:28:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE     *systemFile = fopen(filename, perm);
data/mozjs78-78.4.0/intl/icu/source/io/ufile.cpp:152:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[256];
data/mozjs78-78.4.0/intl/icu/source/io/ufile.cpp:161:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t wperm[40] = {};
data/mozjs78-78.4.0/intl/icu/source/io/uprntf_p.cpp:818:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&scidbl_info, info, sizeof(u_printf_spec_info));
data/mozjs78-78.4.0/intl/icu/source/io/ustdio.cpp:321:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        charBuffer[UFILE_CHARBUFFER_SIZE];
data/mozjs78-78.4.0/intl/icu/source/io/ustdio.cpp:416:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        charBuffer[UFILE_CHARBUFFER_SIZE];
data/mozjs78-78.4.0/intl/icu/source/io/ustdio.cpp:720:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(chars + read, str->fPos, dataSize * sizeof(UChar));
data/mozjs78-78.4.0/intl/icu/source/io/ustream.cpp:43:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[200];
data/mozjs78-78.4.0/intl/icu/source/io/ustream.cpp:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[16];
data/mozjs78-78.4.0/intl/icu/source/stubdata/stubdata.cpp:31:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char padding[8];
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[1]; /* This is dynamically allocated off the end with malloc. */
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:64:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ERROR_LOG[MAX_TEST_LOG][MAXTESTNAME];
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:118:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char gTestName[1024] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:133:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char XML_PREFIX[256];
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:160:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char n[255];
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:299:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(str, "[(%.0fm %.1fs)]", mins, (deltaTime-(mins*60000.0))/1000.0);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:301:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(str, "((%.1fs))", deltaTime/1000.0);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:303:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(str, "( %.2fs )", deltaTime/1000.0);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:305:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(str, " (%.0fms) ", deltaTime);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:312:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[256];
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:334:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathToFunction[MAXTESTNAME] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:335:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char separatorString[2] = { TEST_SEPARATOR, '\0'};
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:376:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char timeDelta[256];
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:377:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char timeSeconds[256];
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:407:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(timeSeconds, "%f", (stopTime-startTime)/1000.0);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:541:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  FILE *summf = fopen(SUMMARY_FILE, "w");
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:700:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[2048];
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:895:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[500];
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:904:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[500];
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:923:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[500];
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:1273:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  XML_FILE = fopen(XML_FILE_NAME,"w");
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/datamap.cpp:23:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ch[256];
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/datamap.cpp:28:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  return atoi(ch);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/tstdtmod.cpp:41:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[4000];
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/tstdtmod.cpp:68:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[4000];
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/tstdtmod.cpp:93:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[4000];
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/uperf.cpp:122:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(options+optionsCount, addOptions, addOptionsCount*sizeof(UOption));
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/uperf.cpp:131:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(addOptions, options+OPTIONS_COUNT, addOptionsCount*sizeof(UOption));
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/uperf.cpp:161:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        passes = atoi(options[PASSES].value);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/uperf.cpp:164:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        iterations = atoi(options[ITERATIONS].value);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/uperf.cpp:170:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        time = atoi(options[TIME].value);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/uperf.cpp:230:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(lines[numLines].name, line, len * U_SIZEOF_UCHAR);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/uperf.cpp:244:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(newLines, lines, numLines*sizeof(ULine));
data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/cptbl.h:4:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char cp1047_8859_1[256] = { 
data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/escapesrc.cpp:115:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp2[5];
data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/escapesrc.cpp:116:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(tmp2, "\\x%02X", 0xFF & (int)(byte));
data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/escapesrc.cpp:132:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[9];
data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/escapesrc.cpp:297:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char newSeq[20];
data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/escapesrc.cpp:299:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(newSeq, "\\u%04X", c);
data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/escapesrc.cpp:301:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(newSeq, "\\U%08X", c);
data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/escapesrc.cpp:372:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  inf.open(infile.c_str(), std::ios::in);
data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/escapesrc.cpp:382:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  outf.open(outfile.c_str(), std::ios::out);
data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/tblgen.cpp:26:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cp1047[1];
data/mozjs78-78.4.0/intl/icu/source/tools/genbrk/genbrk.cpp:179:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[1024];
data/mozjs78-78.4.0/intl/icu/source/tools/genbrk/genbrk.cpp:209:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    file = fopen(ruleFileName, "rb");
data/mozjs78-78.4.0/intl/icu/source/tools/gencfu/gencfu.cpp:193:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[1024];
data/mozjs78-78.4.0/intl/icu/source/tools/gencfu/gencfu.cpp:309:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    file = fopen(fileName, "rb");
data/mozjs78-78.4.0/intl/icu/source/tools/gencnval/gencnval.c:99:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char stringStore[STRING_STORE_SIZE];
data/mozjs78-78.4.0/intl/icu/source/tools/gencnval/gencnval.c:115:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char tagStore[TAG_STORE_SIZE];
data/mozjs78-78.4.0/intl/icu/source/tools/gencnval/gencnval.c:226:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathBuf[512];
data/mozjs78-78.4.0/intl/icu/source/tools/gencnval/gencnval.c:332:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[MAX_LINE_SIZE];
data/mozjs78-78.4.0/intl/icu/source/tools/gencnval/gencnval.c:333:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lastLine[MAX_LINE_SIZE];
data/mozjs78-78.4.0/intl/icu/source/tools/gencolusb/extract_unsafe_backwards.cpp:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char verString[20];
data/mozjs78-78.4.0/intl/icu/source/tools/gencolusb/extract_unsafe_backwards.cpp:84:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf2[2048];
data/mozjs78-78.4.0/intl/icu/source/tools/gendict/gendict.cpp:300:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[1024];
data/mozjs78-78.4.0/intl/icu/source/tools/gendict/gendict.cpp:365:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char s[16];
data/mozjs78-78.4.0/intl/icu/source/tools/gendict/gendict.cpp:471:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char tmp[1024];
data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.cpp:116:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[U_MAX_VERSION_STRING_LENGTH];
data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.cpp:122:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(unicodeVersion, version, U_MAX_VERSION_LENGTH);
data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.cpp:774:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dataInfo.dataVersion, unicodeVersion, 4);
data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.cpp:830:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[100];
data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.cpp:881:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *f = fopen(filename, "w");
data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.cpp:891:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char uv[U_MAX_VERSION_STRING_LENGTH];
data/mozjs78-78.4.0/intl/icu/source/tools/gennorm2/n2builder.cpp:989:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(diff.unicodeVersion, b1.unicodeVersion, U_MAX_VERSION_LENGTH);
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/derb.cpp:145:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            truncsize = atoi(options[4].value); /* user defined printable size */
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/derb.cpp:392:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char msg[128];
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/derb.cpp:394:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(msg, "// WARNING: this resource, size %li is truncated to %li\n",
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/derb.cpp:436:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char msg[128];
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/derb.cpp:438:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(msg, "// WARNING: this resource, size %li is truncated to %li\n",
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/derb.cpp:495:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char msg[128];
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/derb.cpp:497:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(msg, "// WARNING: this resource, size %li is truncated to %li\n",
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/genrb.cpp:558:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char outputFileName[256];
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/genrb.cpp:587:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char outputFileName[256];
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/parse.cpp:95:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *tokenNames[TOK_TOKEN_COUNT] =
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/parse.cpp:315:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              filename[256] = { '\0' };
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/parse.cpp:316:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              cs[128]       = { '\0' };
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/parse.cpp:459:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              filename[256] = { '\0' };
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/parse.cpp:460:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              cs[128]       = { '\0' };
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/parse.cpp:538:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              filename[256] = { '\0' };
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/parse.cpp:539:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              cs[128]       = { '\0' };
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/parse.cpp:803:23:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            buffer += sprintf(buffer, "\\u%04X", (int)c);
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/parse.cpp:821:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               subtag[1024];
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/parse.cpp:879:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char     ver[40];
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/parse.cpp:969:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char preBuffer[100], postBuffer[100];
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/parse.cpp:1050:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               subtag[1024], typeKeyword[1024];
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/parse.cpp:1178:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              subtag[1024];
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/parse.cpp:1482:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char toConv[3] = {'\0', '\0', '\0'};
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/parse.cpp:1827:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tokenBuffer[1024];
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/prscmnts.cpp:41:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *patternStrings[UPC_LIMIT]={
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/rbutil.c:70:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char digits[16] = {'0','1','2','3','4','5','6','7','8','9','a','b','c','d','e','f'};
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/reslist.cpp:843:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            dataName[1024];
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtjava.cpp:109:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[30]={'\0'};
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtjava.cpp:189:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char dest[30] = {0};
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtjava.cpp:397:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtjava.cpp:434:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtjava.cpp:451:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char byteBuffer[100] = { 0 };
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtjava.cpp:624:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[256] = {'\0'};
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtjava.cpp:625:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[256]={'\0'};
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtxml.cpp:702:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char c[256] = {0};
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtxml.cpp:733:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256] = {'0'};
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtxml.cpp:738:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char c[256] = {0};
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtxml.cpp:779:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256] = {0};
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtxml.cpp:810:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[1024] ={0};
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtxml.cpp:870:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char temp[256] = {0};
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtxml.cpp:1037:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char timeBuf[128];
data/mozjs78-78.4.0/intl/icu/source/tools/gensprep/gensprep.c:326:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *fields[4][2];
data/mozjs78-78.4.0/intl/icu/source/tools/gensprep/gensprep.c:432:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *fields[3][2];
data/mozjs78-78.4.0/intl/icu/source/tools/gentest/genres32.c:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char key[20]="ooooooooooooooooo";
data/mozjs78-78.4.0/intl/icu/source/tools/gentest/genres32.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char file[512];
data/mozjs78-78.4.0/intl/icu/source/tools/gentest/genres32.c:63:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out = fopen(file, "w");
data/mozjs78-78.4.0/intl/icu/source/tools/gentest/gentest.c:145:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char file[512];
data/mozjs78-78.4.0/intl/icu/source/tools/gentest/gentest.c:154:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out = fopen(file, "w");
data/mozjs78-78.4.0/intl/icu/source/tools/icuinfo/icuinfo.cpp:283:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      FILE *out = fopen(options[7].value, "w");
data/mozjs78-78.4.0/intl/icu/source/tools/icupkg/icupkg.cpp:511:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char outFilenameBuffer[1024]; // for auto-generated output filename, if necessary
data/mozjs78-78.4.0/intl/icu/source/tools/icupkg/icupkg.cpp:525:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char suffix[6]="?.dat";
data/mozjs78-78.4.0/intl/icu/source/tools/icuswap/icuswap.cpp:141:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    data=(char *)options[OPT_OUT_TYPE].value;
data/mozjs78-78.4.0/intl/icu/source/tools/icuswap/icuswap.cpp:167:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    in=fopen(argv[1], "rb");
data/mozjs78-78.4.0/intl/icu/source/tools/icuswap/icuswap.cpp:255:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out=fopen(argv[2], "wb");
data/mozjs78-78.4.0/intl/icu/source/tools/icuswap/icuswap.cpp:354:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char inPkgName[32], outPkgName[32];
data/mozjs78-78.4.0/intl/icu/source/tools/makeconv/genmbcs.cpp:377:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[10];
data/mozjs78-78.4.0/intl/icu/source/tools/makeconv/genmbcs.cpp:687:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[10];
data/mozjs78-78.4.0/intl/icu/source/tools/makeconv/makeconv.cpp:203:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cnvName[UCNV_MAX_FULL_FILE_NAME_LENGTH];
data/mozjs78-78.4.0/intl/icu/source/tools/makeconv/makeconv.cpp:440:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[1024];
data/mozjs78-78.4.0/intl/icu/source/tools/makeconv/makeconv.cpp:567:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[1024];
data/mozjs78-78.4.0/intl/icu/source/tools/makeconv/makeconv.cpp:725:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char baseFilename[500];
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:236:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char libFileNames[LIB_FILENAMES_SIZE][256];
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:522:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmdBuffer[SMALL_BUFFER_MAX_SIZE];
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:573:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char targetDir[SMALL_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:574:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpDir[SMALL_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:575:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char datFileName[SMALL_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:576:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char datFileNamePath[LARGE_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:577:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char checkLibFile[LARGE_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:622:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char targetFileNamePath[LARGE_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:658:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char gencFilePath[SMALL_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:659:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char version_major[10] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:770:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char optMatchArch[10] = { 0 };
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1043:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmd[LARGE_BUFFER_MAX_SIZE];
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1044:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name1[SMALL_BUFFER_MAX_SIZE]; /* symlink file name */
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1045:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name2[SMALL_BUFFER_MAX_SIZE]; /* file name to symlink */
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1134:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmd[SMALL_BUFFER_MAX_SIZE];
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1205:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmd[SMALL_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1237:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmd[SMALL_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1249:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[SMALL_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1305:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmd[LARGE_BUFFER_MAX_SIZE];
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1469:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char PDS_LibName[512];
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1470:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char PDS_Name[512];
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1540:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tempObjectFile[SMALL_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1592:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const static char DATA_PREFIX[DATA_PREFIX_LENGTH][10] = {
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1611:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char gencmnFile[SMALL_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1612:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tempObjectFile[SMALL_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1614:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char icudtAll[SMALL_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1675:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char newName[SMALL_BUFFER_MAX_SIZE];
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1676:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char dataName[SMALL_BUFFER_MAX_SIZE];
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1677:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char dataDirName[SMALL_BUFFER_MAX_SIZE];
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1689:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char newNameTmp[SMALL_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1817:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmd[LARGE_BUFFER_MAX_SIZE];
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1819:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char staticLibFilePath[SMALL_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1842:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char dllFilePath[SMALL_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1843:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char libFilePath[SMALL_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1844:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char resFilePath[SMALL_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1845:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmpResFilePath[SMALL_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1889:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char extraFlags[SMALL_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1932:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpbuffer[SMALL_BUFFER_MAX_SIZE];
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:1935:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mapFile[SMALL_BUFFER_MAX_SIZE] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:2069:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        line[16384];
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:2205:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[512] = "";
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:2263:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char cmd[LARGE_BUFFER_MAX_SIZE];
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgtypes.c:32:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1024];
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgtypes.c:77:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1024];
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgtypes.c:212:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char aBuf[1024];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/dbgutil.cpp:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ch[256];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/dbgutil.cpp:124:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return atoi(ch);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/dbgutil.cpp:131:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ch[256];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/filestrm.cpp:36:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FILE *file = fopen(filename, mode);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/filestrm.cpp:84:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE* temp = fopen(filename, "r");
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:197:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pkg, basename, len);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:307:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[1024];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:315:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    file=fopen(filename, "rb");
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:409:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pHeader->info, &dataInfo, sizeof(dataInfo));
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:540:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char prefix[MAX_PKG_NAME_LENGTH+4];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:608:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pkgPrefix, s, prefixLength);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:610:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(prefix, s, ++prefixLength);  // include the /
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:614:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(prefix, inPkgName, inPkgNameLength);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:687:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prefix[MAX_PKG_NAME_LENGTH+4];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:713:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(header+headerLength, comment, length+1);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:749:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    file=fopen(filename, "wb");
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:775:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(prefix, pkgPrefix, prefixLength);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:802:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(name, prefix, prefixLength);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:803:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(name+prefixLength, items[i].name, length+1);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:1128:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[1024];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:1170:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    file=fopen(filename, "wb");
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.h:159:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char inPkgName[MAX_PKG_NAME_LENGTH];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.h:160:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pkgPrefix[MAX_PKG_NAME_LENGTH];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.h:175:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char inStrings[STRING_STORE_SIZE], outStrings[STRING_STORE_SIZE];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:283:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char entry[96];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:286:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char chars[4096];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:398:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[4096], entry[96];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:544:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bitFieldStr[64]; /* This is more bits than needed for a 32-bit number */
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:547:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char hexToStr[16] = {
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:608:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[4];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:641:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[8];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:644:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(s, "\\x%X", byte);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:646:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(s, "\\%X", byte);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:749:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char        bytes[2048];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:887:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[4096], entry[96]={ 0 };
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:995:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char sectionStrings[40]=
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:1012:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char padding[16]={ 0 };
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:1128:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char linkerOptions[100];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:1133:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char longNames[100];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:1296:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        uprv_strncpy((char *)symbols[0].N.ShortName, entry, entryLength);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_gencmn.cpp:81:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char stringStore[STRING_STORE_SIZE];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_gencmn.cpp:122:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buffer[4096];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_icu.cpp:80:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char line[1024];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_icu.cpp:84:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        file=fopen(listname, "r");
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkgitems.cpp:158:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(target, itemName, treeLength);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkgitems.cpp:159:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(target+treeLength, id, idLength);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkgitems.cpp:160:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(target+treeLength+idLength, suffix, suffixLength+1); // +1 includes the terminating NUL
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkgitems.cpp:167:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char target[200];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkgitems.cpp:263:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localeID[32];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkgitems.cpp:397:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char poolName[200];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkgitems.cpp:520:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char baseName[32];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ppucd.cpp:70:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        file=fopen(filename, "r");
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ppucd.h:176:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lines[kNumLineBuffers][4096];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/swapimpl.cpp:859:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dataFormatChars[4];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/toolutil.cpp:245:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[64];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/toolutil.cpp:248:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    alignas(std::max_align_t) char staticArray[1];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucbuf.cpp:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char start[8];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucbuf.cpp:167:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  carr[MAX_IN_BUF] = {'\0'};
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucbuf.cpp:227:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char context[CONTEXT_LEN+1];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucbuf.cpp:228:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char preContext[CONTEXT_LEN+1];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucbuf.cpp:229:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char postContext[CONTEXT_LEN+1];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucbuf.cpp:254:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(preContext,cbuf+start,stop-start);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucbuf.cpp:262:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(postContext,source,stop-start);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucbuf.cpp:422:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char context[CONTEXT_LEN+1];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucbuf.cpp:590:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char start[8];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucm.cpp:1153:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[500];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucm.h:108:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char baseName[UCNV_MAX_CONVERTER_NAME_LENGTH];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucmstate.cpp:51:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/ucmstate.cpp:52:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
parseState(const char *s, int32_t state[256], uint32_t *pFlags) {
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/udbgutil.cpp:432:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[300];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/udbgutil.cpp:458:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[200]="";
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/udbgutil.cpp:476:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf2[100];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/udbgutil.cpp:581:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[2000];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/udbgutil.cpp:700:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char URL[1024];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/unewdata.cpp:42:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[512];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/uparse.cpp:80:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[10000];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:33:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1024];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:52:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f=fopen(p, "w");
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:77:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[200];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/writesrc.cpp:298:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[100], line2[100], line3[100];
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/xmlparser.cpp:166:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bytes[4096], charsetBuffer[100];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/asctime.c:65:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char	buf_asctime[MAX_ASCTIME_BUF_SIZE];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/asctime.c:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			year[INT_STRLEN_MAXIMUM(int) + 2];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/asctime.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			result[MAX_ASCTIME_BUF_SIZE];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/asctime.c:88:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		return strcpy(buf, "??? ??? ?? ??:??:?? ????\n");
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/icuzdump.cpp:340:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            high = atoi(options[kOptCutover].value);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/icuzdump.cpp:343:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            low = atoi(options[kOptCutover].value);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/icuzdump.cpp:344:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            high = atoi(comma + 1);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:109:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	types[TZ_MAX_TIMES];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		chars[BIGGEST(BIGGEST(TZ_MAX_CHARS + 1, sizeof gmt),
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:199:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char		lcl_TZname[TZ_STRLEN_MAX + 1];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:203:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *			tzname[2] = {
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:334:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		buf[2 * sizeof(struct tzhead) +
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:361:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		fullname[FILENAME_MAX + 1];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:383:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((fid = open(name, OPEN_MODE)) == -1)
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tz2icu.cpp:243:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4]; // must be UNSIGNED
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tz2icu.cpp:261:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[8]; // must be UNSIGNED
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tz2icu.cpp:301:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[32];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tz2icu.cpp:649:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pwd[512];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tzfile.h:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tzh_magic[4];		/* TZ_MAGIC */
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tzfile.h:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tzh_version[1];		/* '\0' or '2' or '3' as of 2013 */
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tzfile.h:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tzh_reserved[15];	/* reserved--must be zero */
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tzfile.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tzh_ttisgmtcnt[4];	/* coded number of trans. time flags */
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tzfile.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tzh_ttisstdcnt[4];	/* coded number of trans. time flags */
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tzfile.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tzh_leapcnt[4];		/* coded number of leap seconds */
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tzfile.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tzh_timecnt[4];		/* coded number of transition times */
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tzfile.h:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tzh_typecnt[4];		/* coded number of local time types */
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tzfile.h:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tzh_charcnt[4];		/* coded number of abbr. chars */
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:216:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char *	tzname[2];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:534:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		(void) strcpy(fakeenv[to++], "TZ=");
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:542:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static char	buf[MAX_STRING_LENGTH];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:560:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char	path[FILENAME_MAX + 1];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:571:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if ((fp = fopen(path, "w")) == NULL) {
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:740:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			loab[MAX_STRING_LENGTH];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:935:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			loab[MAX_STRING_LENGTH];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:1043:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	path[FILENAME_MAX + 1];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:1077:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	subpath[FILENAME_MAX + 1];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:407:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char		isdsts[TZ_MAX_TYPES];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:408:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char	abbrinds[TZ_MAX_TYPES];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:409:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char		ttisstds[TZ_MAX_TYPES];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:410:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char		ttisgmts[TZ_MAX_TYPES];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:411:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char		chars[TZ_MAX_CHARS];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:414:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char		roll[TZ_MAX_LEAPS];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:713:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((icuFile = fopen(ICU_ZONE_FILE, "w")) == NULL) {
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:824:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fp = fopen(fromname, "rb");
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:832:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			tp = fopen(toname, "wb");
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:982:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				buf[BUFSIZ];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:987:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	} else if ((fp = fopen(name, "r")) == NULL) {
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1567:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[4];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1576:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[8];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1699:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen(fullname, "wb")) == NULL) {
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1702:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((fp = fopen(fullname, "wb")) == NULL) {
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1717:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		thischars[TZ_MAX_CHARS];
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2011:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	(void) sprintf(end(result), "%d", hours);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2013:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		(void) sprintf(end(result), ":%02d", minutes);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2015:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			(void) sprintf(end(result), ":%02d", seconds);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2038:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		  (void) sprintf(result, "%d", total + rp->r_dayofmonth - 1);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2040:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		  (void) sprintf(result, "J%d", total + rp->r_dayofmonth);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2067:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		(void) sprintf(result, "M%d.%d.%d",
data/mozjs78-78.4.0/js/public/ProfilingFrameIterator.h:50:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  alignas(void*) unsigned char storage_[StorageSpace];
data/mozjs78-78.4.0/js/public/StructuredClone.h:520:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(iter.Data(), data, nbytes);
data/mozjs78-78.4.0/js/public/UbiNode.h:382:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(storage.u.mBytes, rhs.storage.u.mBytes, sizeof(storage.u));
data/mozjs78-78.4.0/js/public/UbiNode.h:386:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(storage.u.mBytes, rhs.storage.u.mBytes, sizeof(storage.u));
data/mozjs78-78.4.0/js/public/UbiNode.h:763:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(storage.u.mBytes, rhs.storage.u.mBytes, sizeof(storage.u));
data/mozjs78-78.4.0/js/public/UbiNode.h:767:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(storage.u.mBytes, rhs.storage.u.mBytes, sizeof(storage.u));
data/mozjs78-78.4.0/js/rust/src/jsglue.cpp:725:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, bytes, size);
data/mozjs78-78.4.0/js/src/builtin/DataViewObject.cpp:286:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest, src, nbytes);
data/mozjs78-78.4.0/js/src/builtin/Profilers.cpp:45:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char gLastError[2000];
data/mozjs78-78.4.0/js/src/builtin/Profilers.cpp:488:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cwd[4096];
data/mozjs78-78.4.0/js/src/builtin/Profilers.cpp:499:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mainPidStr[16];
data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.cpp:144:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  *valueOut = atoi(getenv(name));
data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.cpp:539:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256] = {'\0'};
data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.cpp:810:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.cpp:813:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(buf, "baseline");
data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.cpp:819:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(buf, "ion");
data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.cpp:825:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(buf, "cranelift");
data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.cpp:912:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char lastAnalysisResult[1024];
data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.cpp:2696:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      dumpFile = fopen(fileNameBytes.get(), "w");
data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.cpp:3716:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[64];
data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.cpp:3748:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[64];
data/mozjs78-78.4.0/js/src/builtin/TypedObject.cpp:2186:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(res->inlineTypedMem(), templateObject->inlineTypedMem(),
data/mozjs78-78.4.0/js/src/builtin/intl/DisplayNames.cpp:433:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char scriptChars[intl::LanguageTagLimits::ScriptLength + 1];
data/mozjs78-78.4.0/js/src/builtin/intl/DisplayNames.cpp:486:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char regionChars[intl::LanguageTagLimits::RegionLength + 1];
data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTag.h:141:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char chars_[Length] = {};  // zero initialize
data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTag.h:754:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_[LanguageTagLimits::UnicodeKeyLength];
data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTagGenerated.cpp:111:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char languages[9][3] = {
data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTagGenerated.cpp:126:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char languages[345][4] = {
data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTagGenerated.cpp:223:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char languages[6][4] = {
data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTagGenerated.cpp:241:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char regions[23][3] = {
data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTagGenerated.cpp:260:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char regions[300][4] = {
data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTagGenerated.cpp:348:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char regions[8][4] = {
data/mozjs78-78.4.0/js/src/builtin/intl/Locale.cpp:1367:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char unicodeKey[UnicodeKeyLength];
data/mozjs78-78.4.0/js/src/builtin/intl/NumberFormat.cpp:363:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char unitChars[MaxUnitLength() + 1] = {};
data/mozjs78-78.4.0/js/src/ctypes/CTypes.cpp:103:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[10];
data/mozjs78-78.4.0/js/src/ctypes/CTypes.cpp:1089:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char indexStr[21];  // space for UINT64_MAX plus terminating null
data/mozjs78-78.4.0/js/src/ctypes/CTypes.cpp:3631:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(buffer, intermediate.get(), arraySize);
data/mozjs78-78.4.0/js/src/ctypes/CTypes.cpp:3743:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buffer, intermediate.get(), structSize);
data/mozjs78-78.4.0/js/src/ctypes/CTypes.cpp:6257:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fieldLengthStr[32];
data/mozjs78-78.4.0/js/src/ctypes/CTypes.cpp:7457:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(result, cinfo->errResult, copySize);
data/mozjs78-78.4.0/js/src/ctypes/CTypes.cpp:7568:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(data, source, size);
data/mozjs78-78.4.0/js/src/ctypes/CTypes.cpp:8045:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, data, size.value());
data/mozjs78-78.4.0/js/src/ctypes/CTypes.h:148:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char array[16];
data/mozjs78-78.4.0/js/src/ctypes/Library.cpp:174:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char error[MAX_ERROR_LEN] = "Cannot get error from NSPR.";
data/mozjs78-78.4.0/js/src/ctypes/libffi/include/ffi_common.h:55:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#  define memcpy(d, s, n) bcopy ((s), (d), (n))
data/mozjs78-78.4.0/js/src/ctypes/libffi/include/ffi_common.h:55:27:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#  define memcpy(d, s, n) bcopy ((s), (d), (n))
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/aarch64/ffi.c:580:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (allocate_to_stack (state, stack, ty->alignment, ty->size),
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/aarch64/ffi.c:731:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		  memcpy (allocate_to_x (context, &state),
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/aarch64/ffi.c:744:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy (allocate_to_stack (&state, stack, ty->alignment,
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/aarch64/ffi.c:882:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy (rvalue, get_x_addr (&context, 0), size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/aarch64/ffi.c:897:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy (get_x_addr (&context, 8), &rvalue, sizeof (UINT64));
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/aarch64/ffi.c:924:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (__tramp, trampoline, sizeof (trampoline));			\
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/aarch64/ffi.c:925:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (__tramp + 12, &__fun, sizeof (__fun));			\
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/aarch64/ffi.c:926:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (__tramp + 20, &__ctx, sizeof (__ctx));			\
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/aarch64/ffi.c:927:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (__tramp + 28, &__flags, sizeof (__flags));			\
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/aarch64/ffi.c:1037:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			  memcpy (&p[j],
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/aarch64/ffi.c:1058:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			  memcpy (&p[j],
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/aarch64/ffi.c:1066:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			  memcpy (&avalue[i],
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/aarch64/ffi.c:1165:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy (get_x_addr (context, 0), rvalue, size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/aarch64/ffi.c:1179:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&rvalue, get_x_addr (context, 8), sizeof (UINT64));
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/alpha/ffi.c:158:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(argp, *avalue, (*arg_types)->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/arc/ffi.c:102:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy (argp, *p_argv, (*p_arg)->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/arc/ffi.c:117:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy (argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/arc/ffi.c:122:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy (argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/arm/ffi.c:97:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(argp, *p_argv, (*p_arg)->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/arm/ffi.c:117:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/arm/ffi.c:355:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (rvalue, &temp, cif->rtype->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/arm/ffi.c:361:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (rvalue, ecif.rvalue, cif->rtype->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/arm/ffi.c:759:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy (__tramp, ffi_arm_trampoline, sizeof ffi_arm_trampoline);     \
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/arm/ffitarget.h:57:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  signed char vfp_args[16]			\
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/avr32/ffi.c:153:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(addr, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/bfin/ffi.c:179:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(argp, *p_argv, (*p_arg)->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/bfin/ffi.c:188:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/closures.c:143:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f = fopen ("/proc/mounts", "r");
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/closures.c:188:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f = fopen ("/proc/self/status", "r");
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/closures.c:270:12:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
  int fd = mkstemp (name);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/closures.c:289:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (tempname, dir, lendir);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/closures.c:290:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (tempname + lendir, suffix, sizeof (suffix));
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/closures.c:339:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[MAXPATHLEN * 3];
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/cris/ffi.c:94:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy (argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/cris/ffi.c:99:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy (argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/cris/ffi.c:110:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy ((stack + uiLocOnStack), *p_argv, (*p_arg)->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/cris/ffi.c:146:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy (argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/cris/ffi.c:378:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (closure->tramp, ffi_cris_trampoline_template,
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/cris/ffi.c:380:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (closure->tramp + ffi_cris_trampoline_fn_offset,
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/cris/ffi.c:382:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (closure->tramp + ffi_cris_trampoline_closure_offset,
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/dlmalloc.c:1319:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
           (dev_zero_fd = open("/dev/zero", O_RDWR), \
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/dlmalloc.c:2525:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char buf[sizeof(size_t)];
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/dlmalloc.c:2527:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fd = open("/dev/urandom", O_RDONLY)) >= 0 &&
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/dlmalloc.c:3894:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newmem, oldmem, (oc < bytes)? oc : bytes);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/frv/ffi.c:103:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/ia64/ffi.c:330:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy (&tmp, avalue[i], sizeof (UINT32));
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/ia64/ffi.c:338:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (&stack->gp_regs[gpcount++], avalue[i], sizeof (UINT64));
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/ia64/ffi.c:346:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (&stack->gp_regs[gpcount], avalue[i], 16);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/ia64/ffi.c:378:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy (&stack->gp_regs[gpcount], avalue[i], size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/ia64/ffi.c:568:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		  memcpy (addr + offset, (char *)stack->gp_regs + gp_offset,
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/java_raw_api.c:225:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy ((void*) raw->data, (void*)*args, (*tp)->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m32r/ffi.c:95:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy (argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m32r/ffi.c:97:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy (argp + 4 - z, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m32r/ffi.c:120:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	              memcpy(argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m32r/ffi.c:127:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	          memcpy (argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m32r/ffi.c:214:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		  memcpy (ecif.rvalue, ecif.rvalue + 8-size, size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m32r/ffi.c:222:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy (ecif.rvalue, ecif.rvalue + 8-size, size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m68k/ffi.c:89:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy (argp + 2, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m68k/ffi.c:91:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy (argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m68k/ffi.c:93:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy (argp + sizeof (int) - z, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m68k/ffi.c:104:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/m88k/ffi.c:171:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/metag/ffi.c:82:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(argp, *p_argv, (*p_arg)->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/metag/ffi.c:90:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/metag/ffi.c:205:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy (rvalue, &temp, cif->rtype->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/metag/ffi.c:228:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (__tramp, ffi_metag_trampoline, sizeof(ffi_metag_trampoline));
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/microblaze/ffi.c:62:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(addr, &(ecif->rvalue), WORD_SIZE);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/microblaze/ffi.c:122:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				  memcpy (addr + (WORD_SIZE - size), value, size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/microblaze/ffi.c:133:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(addr, value, aligned_size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/microblaze/ffi.c:201:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(stackclone, register_args, registers_used);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/microblaze/ffi.c:206:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stackclone + ARGS_REGISTER_SIZE, stack_args, stack_used);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/microblaze/ffi.c:244:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				  memcpy (ptr, ptr + (WORD_SIZE - arg_types[i]->size), arg_types[i]->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/mips/ffi.c:190:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(argp, *p_argv, (*p_arg)->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/mips/ffi.c:197:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/mips/ffi.c:207:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy(argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/mips/ffi.c:212:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(argp, *p_argv, portion);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/mips/ffi.c:215:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(argp, (void*)((unsigned long)(*p_argv) + portion),
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/mips/ffi.c:647:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(ecif.rvalue, rvalue_copy + copy_offset, cif->rtype->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/mips/ffi.c:893:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tp, argp + arg_offset, elt_type->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/moxie/ffi.c:96:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/nios2/ffi.c:130:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy (argp, avalue, atype->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/nios2/ffi.c:140:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (argp, avalue, size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/nios2/ffi.c:193:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (rvalue, (void *)&result, cif->rtype->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/pa/ffi.c:239:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy(dest_cpy, (char *)*p_argv, len);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/pa/ffi.c:245:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy(dest_cpy, (char *)*p_argv, len);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/pa/ffi.c:580:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy((void*)tmp, &ret[0], cif->rtype->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/pa/ffi.c:601:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((char *)ret2 + off, ret, 8 - off);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi.c:114:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (rvalue, (char *) smst_buffer + 4 - rsize, rsize);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi.c:121:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (rvalue, (char *) smst_buffer + 8 - rsize, rsize);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi.c:124:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (rvalue, smst_buffer, rsize);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_darwin.c:273:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy ((char *) dest_cpy, (char *) *p_argv, size_al);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_darwin.c:282:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy((char *) dest_cpy, (char *) *p_argv, size_al);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_darwin.c:498:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy ((char *) dest_cpy, src, size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_darwin.c:503:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy ((char *) dest_cpy, src, size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_darwin.c:509:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy ((char *) dest_cpy, src, size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_darwin.c:1211:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  pgr = (unsigned long *)ALIGN((char *)pgr, arg_types[i]->alignment);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_darwin.c:1336:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy (&temp_ld.lb[0], pfr, sizeof(ldbits));
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_darwin.c:1337:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy (&temp_ld.lb[1], pgr + 2, sizeof(ldbits));
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_linux64.c:594:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		  memcpy (next_arg.c, *p_argv.c, first);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_linux64.c:595:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		  memcpy (rest.c, *p_argv.c + first, (*ptr)->size - first);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_linux64.c:608:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		  memcpy (where, *p_argv.c, (*ptr)->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_linux64.c:699:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (tramp, (char *) ffi_closure_LINUX64, 16);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/powerpc/ffi_sysv.c:575:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (copy_space.c, *p_argv.c, (*ptr)->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/raw_api.c:175:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy ((void*) raw->data, (void*)*args, (*tp)->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/s390/ffi.c:226:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy (p_struct, (char *)arg, (*ptr)->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sh/ffi.c:203:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sh/ffi.c:218:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sh/ffi.c:294:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sh/ffi.c:313:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sh/ffi.c:448:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (rvalue, &trvalue, cif->rtype->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sh64/ffi.c:106:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy (argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sh64/ffi.c:147:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sh64/ffi.c:290:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (rvalue, &trvalue, cif->rtype->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sparc/ffi.c:113:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		  memcpy(argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sparc/ffi.c:218:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy(argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sparc/ffi.c:229:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/sparc/ffi.c:240:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/tile/ffi.c:130:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(out, in, type->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/tile/ffi.c:192:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(argp, arg_in, type->size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/vax/ffi.c:97:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy (argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/vax/ffi.c:107:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/x86/ffi.c:112:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/x86/ffi.c:155:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(argp, *p_argv, z);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/x86/ffi.c:196:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (h, p_stack_data[0], zz);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/x86/ffi.c:198:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	           (size_t) ((char *) p_stack_data[0] - (char*)argp2));
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/x86/ffi.c:199:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (argp2, h, zz);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/x86/ffi.c:215:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (h, p_stack_data[1], zz);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/x86/ffi.c:217:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (argp2, h, zz);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/x86/ffi.c:770:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (stack, ecif->avalue, ecif->cif->bytes);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/x86/ffi64.c:485:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (argp, avalue[i], size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/x86/ffi64.c:491:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  char *a = (char *) avalue[i];
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/x86/ffi64.c:517:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		      memcpy (&reg_args->gpr[gprcount], a, size < 8 ? size : 8);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/x86/ffi64.c:672:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy (a, &reg_args->sse[ssecount++], 8);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/x86/ffi64.c:674:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy (a, &reg_args->gpr[gprcount++], 8);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/xtensa/ffi.c:178:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char*) addr, *p_argv.c, size);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/xtensa/ffi.c:222:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rvalue, alloc, rsize);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/xtensa/ffi.c:236:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(closure->tramp, ffi_trampoline, FFI_TRAMPOLINE_SIZE);
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_schar.c:27:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  a1 = *(signed char *)avals[0];
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_schar.c:28:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  a2 = *(signed char *)avals[1];
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_sshortchar.c:29:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  a1 = *(signed char *)avals[0];
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_sshortchar.c:31:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  a3 = *(signed char *)avals[2];
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_uchar.c:28:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  a1 = *(unsigned char *)avals[0];
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_uchar.c:29:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  a2 = *(unsigned char *)avals[1];
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_uchar.c:30:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  a3 = *(unsigned char *)avals[2];
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_uchar.c:31:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  a4 = *(unsigned char *)avals[3];
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_uchar.c:43:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  printf("%d %d %d %d\n", *(unsigned char *)avals[0],
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_uchar.c:44:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	 *(unsigned char *)avals[1], *(unsigned char *)avals[2],
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_uchar.c:44:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	 *(unsigned char *)avals[1], *(unsigned char *)avals[2],
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_uchar.c:45:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	 *(unsigned char *)avals[3]);
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_ushortchar.c:29:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  a1 = *(unsigned char *)avals[0];
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_multi_ushortchar.c:31:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  a3 = *(unsigned char *)avals[2];
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_schar.c:15:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  *(ffi_arg*)resp = *(signed char *)args[0];
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_schar.c:16:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  printf("%d: %d\n",*(signed char *)args[0],
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_uchar.c:13:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  *(ffi_arg*)resp = *(unsigned char *)args[0];
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/cls_uchar.c:14:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  printf("%d: %d\n",*(unsigned char *)args[0],
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/float1.c:14:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char c[sizeof (double)];
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/float4.c:16:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char c[sizeof (double)];
data/mozjs78-78.4.0/js/src/debugger/NoExecute.cpp:77:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char linenoStr[15];
data/mozjs78-78.4.0/js/src/debugger/Source.cpp:275:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(arr->as<TypedArrayObject>().dataPointerUnshared(), bytecode.begin(),
data/mozjs78-78.4.0/js/src/devtools/rootAnalysis/t/hazards/source.cpp:17:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data[sizeof(T) + sizeof(U)];
data/mozjs78-78.4.0/js/src/devtools/vprof/vprof.cpp:81:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/mozjs78-78.4.0/js/src/devtools/vprof/vprof.cpp:107:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char s[80];
data/mozjs78-78.4.0/js/src/devtools/vprof/vprof.h:244:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pad[128];  // avoid false sharing
data/mozjs78-78.4.0/js/src/ds/LifoAlloc.h:1012:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(n, p, std::min(oldSize * sizeof(T), newSize * sizeof(T)));
data/mozjs78-78.4.0/js/src/ds/MemoryProtectionExceptionHandler.cpp:459:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst.old_state, state, stateSize);
data/mozjs78-78.4.0/js/src/dtoa.c:608:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define Bcopy(x,y) memcpy((char *)&x->sign, (char *)&y->sign, \
data/mozjs78-78.4.0/js/src/editline/editline.c:225:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char		buff[2048];
data/mozjs78-78.4.0/js/src/editline/editline.h:67:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void)memcpy((char*)(new), (char*)(p), (int)(len))
data/mozjs78-78.4.0/js/src/editline/editline.h:87:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
extern char	*memcpy();
data/mozjs78-78.4.0/js/src/frontend/BinASTRuntimeSupport.cpp:49:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(data->binASTKindBase(), binASTKinds.begin(),
data/mozjs78-78.4.0/js/src/frontend/BinASTTokenReaderContext.h:1380:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  alignas(GenericHuffmanTable) char tables_[sizeof(GenericHuffmanTable) *
data/mozjs78-78.4.0/js/src/frontend/BytecodeEmitter.cpp:1589:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char actualArgsStr[40];
data/mozjs78-78.4.0/js/src/frontend/NameFunctions.cpp:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char number[30];
data/mozjs78-78.4.0/js/src/frontend/Parser.cpp:490:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char columnNumber[MaxWidth];
data/mozjs78-78.4.0/js/src/frontend/Parser.cpp:492:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char lineNumber[MaxWidth];
data/mozjs78-78.4.0/js/src/frontend/Parser.cpp:529:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char columnNumber[MaxWidth];
data/mozjs78-78.4.0/js/src/frontend/Parser.cpp:531:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char lineNumber[MaxWidth];
data/mozjs78-78.4.0/js/src/frontend/TokenStream.cpp:1028:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char badUnitsStr[MaxWidth];
data/mozjs78-78.4.0/js/src/frontend/TokenStream.cpp:1061:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char leadByteStr[5];
data/mozjs78-78.4.0/js/src/frontend/TokenStream.cpp:1076:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char leadByteStr[5];
data/mozjs78-78.4.0/js/src/frontend/TokenStream.cpp:1094:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char badByteStr[5];
data/mozjs78-78.4.0/js/src/frontend/TokenStream.cpp:1117:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char codePointCharsArray[MaxHexSize];
data/mozjs78-78.4.0/js/src/frontend/TokenStream.cpp:2670:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[2] = {char(unit), '\0'};
data/mozjs78-78.4.0/js/src/frontend/TokenStream.h:493:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char column_[sizeof(uint32_t)];
data/mozjs78-78.4.0/js/src/frontend/TokenStream.h:499:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(column_, &col, sizeof(col));
data/mozjs78-78.4.0/js/src/frontend/TokenStream.h:504:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&col, column_, sizeof(uint32_t));
data/mozjs78-78.4.0/js/src/fuzz-tests/testStructuredCloneReader.cpp:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char padding[kSegmentAlignment] = {0};
data/mozjs78-78.4.0/js/src/gc/GC.cpp:1138:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  *paramOut = atoi(text.begin().get());
data/mozjs78-78.4.0/js/src/gc/GC.cpp:1243:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      setMarkStackLimit(atoi(size), lock);
data/mozjs78-78.4.0/js/src/gc/GC.cpp:1863:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst, src, thingSize);
data/mozjs78-78.4.0/js/src/gc/GC.cpp:6548:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char budgetBuffer[32];
data/mozjs78-78.4.0/js/src/gc/Heap.h:551:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char padding[24];
data/mozjs78-78.4.0/js/src/gc/Nursery.cpp:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data[Nursery::NurseryChunkUsableSize];
data/mozjs78-78.4.0/js/src/gc/Nursery.cpp:268:56:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    profileThreshold_ = TimeDuration::FromMicroseconds(atoi(env));
data/mozjs78-78.4.0/js/src/gc/Nursery.cpp:280:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    reportTenurings_ = atoi(env);
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:114:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[300];
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:123:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    file = fopen(value, "a");
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:308:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char budgetDescription[200];
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:314:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[1024];
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:342:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[1024];
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:390:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[128];
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:465:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[1024];
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:485:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char budgetDescription[200];
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:500:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char triggerBuffer[100] = "n/a";
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:508:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[1024];
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:530:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[128];
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:564:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[1024];
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:742:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char budgetDescription[200];
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:830:56:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    profileThreshold_ = TimeDuration::FromMilliseconds(atoi(env));
data/mozjs78-78.4.0/js/src/gc/Verifier.cpp:381:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char msgbuf[1024];
data/mozjs78-78.4.0/js/src/gc/Verifier.cpp:520:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy((void*)entry->bitmap, (void*)bitmap->bitmap,
data/mozjs78-78.4.0/js/src/gdb/tests/test-JSObject.cpp:24:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char namebuf[20] = "goodname";
data/mozjs78-78.4.0/js/src/gdb/tests/test-JSObject.cpp:27:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(namebuf, "\xc7X");
data/mozjs78-78.4.0/js/src/irregexp/RegExpEngine.cpp:3299:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char templ[kSize];
data/mozjs78-78.4.0/js/src/irregexp/RegExpInterpreter.cpp:209:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(matches->pairsRaw(), registers.begin(), matches->length() * 2 * sizeof(int32_t));
data/mozjs78-78.4.0/js/src/jit/BaselineBailouts.cpp:160:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(newHeader->copyStackBottom, header_->copyStackBottom, bufferUsed_);
data/mozjs78-78.4.0/js/src/jit/BaselineBailouts.cpp:210:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(header_->copyStackBottom, &t, sizeof(T));
data/mozjs78-78.4.0/js/src/jit/BaselineBailouts.cpp:1394:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(builder.pointerAtStackOffset<uint8_t>(0).get(), stubArgsEnd.get(),
data/mozjs78-78.4.0/js/src/jit/BaselineIC.cpp:94:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fmtbuf[100];
data/mozjs78-78.4.0/js/src/jit/BaselineIC.cpp:115:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fmtbuf[100];
data/mozjs78-78.4.0/js/src/jit/CacheIRSpewer.cpp:297:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      getenv("CACHEIR_LOG_FLUSH") ? atoi(getenv("CACHEIR_LOG_FLUSH")) : 10000;
data/mozjs78-78.4.0/js/src/jit/CacheIRSpewer.cpp:329:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[256];
data/mozjs78-78.4.0/js/src/jit/Ion.cpp:733:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(offsetToPointer<uint8_t>(snapshotsOffset()), writer->listBuffer(),
data/mozjs78-78.4.0/js/src/jit/Ion.cpp:738:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(offsetToPointer<uint8_t>(rvaTableOffset()), writer->RVATableBuffer(),
data/mozjs78-78.4.0/js/src/jit/Ion.cpp:744:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(offsetToPointer<uint8_t>(recoversOffset()), writer->buffer(),
data/mozjs78-78.4.0/js/src/jit/Ion.cpp:750:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(offsetToPointer<uint8_t>(safepointsOffset()), writer->buffer(),
data/mozjs78-78.4.0/js/src/jit/Ion.cpp:755:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(bailoutTable(), table, numBailoutEntries() * sizeof(SnapshotOffset));
data/mozjs78-78.4.0/js/src/jit/Ion.cpp:773:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(osiIndices(), oi, numOsiIndices() * sizeof(OsiIndex));
data/mozjs78-78.4.0/js/src/jit/Ion.cpp:777:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(runtimeData(), data, runtimeSize());
data/mozjs78-78.4.0/js/src/jit/Ion.cpp:781:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(icIndex(), icEntries, numICs() * sizeof(uint32_t));
data/mozjs78-78.4.0/js/src/jit/Ion.cpp:2291:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(frameStart, (uint8_t*)frame - numValueSlots * sizeof(Value),
data/mozjs78-78.4.0/js/src/jit/IonTypes.h:335:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cst.u.i8x16, array, sizeof(cst.u));
data/mozjs78-78.4.0/js/src/jit/IonTypes.h:347:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cst.u.i16x8, array, sizeof(cst.u));
data/mozjs78-78.4.0/js/src/jit/IonTypes.h:359:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cst.u.i32x4, array, sizeof(cst.u));
data/mozjs78-78.4.0/js/src/jit/IonTypes.h:371:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cst.u.i64x2, array, sizeof(cst.u));
data/mozjs78-78.4.0/js/src/jit/IonTypes.h:383:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cst.u.f32x4, array, sizeof(cst.u));
data/mozjs78-78.4.0/js/src/jit/IonTypes.h:395:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cst.u.f64x2, array, sizeof(cst.u));
data/mozjs78-78.4.0/js/src/jit/JitAllocPolicy.h:103:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(n, p, std::min(oldSize * sizeof(T), newSize * sizeof(T)));
data/mozjs78-78.4.0/js/src/jit/JitSpewer.cpp:158:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char jsonBuffer[bufferLength];
data/mozjs78-78.4.0/js/src/jit/JitSpewer.cpp:519:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char actual_filename[2048] = {0};
data/mozjs78-78.4.0/js/src/jit/JitSpewer.cpp:521:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    spewfh = fopen(actual_filename, "w");
data/mozjs78-78.4.0/js/src/jit/JitcodeMap.cpp:950:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[DumpMaxBytes * 3];
data/mozjs78-78.4.0/js/src/jit/MIR.h:1649:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ret->u.s128_, s.bytes(), 16);
data/mozjs78-78.4.0/js/src/jit/PerfSpewer.cpp:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filenameBuffer[bufferSize];
data/mozjs78-78.4.0/js/src/jit/PerfSpewer.cpp:67:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  PerfFilePtr = fopen(filenameBuffer, "a");
data/mozjs78-78.4.0/js/src/jit/ProcessExecutableMemory.cpp:217:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&r->thunk[2], &handler, 8);
data/mozjs78-78.4.0/js/src/jit/Snapshots.h:471:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  alignas(Alignment) unsigned char mem[Size];
data/mozjs78-78.4.0/js/src/jit/arm/Architecture-arm.cpp:224:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = open("/proc/self/auxv", O_RDONLY);
data/mozjs78-78.4.0/js/src/jit/arm/Architecture-arm.cpp:240:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen("/proc/cpuinfo", "r");
data/mozjs78-78.4.0/js/src/jit/arm/Architecture-arm.cpp:242:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:725:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, jumpRelocations_.buffer(), jumpRelocations_.length());
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:731:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, dataRelocations_.buffer(), dataRelocations_.length());
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:2285:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(this, i, sizeof(Header));
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:2292:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&dest, this, sizeof(Header));
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:2726:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char labelBuf[128];
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:2771:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char litbuf[2048];
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.h:489:36:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  explicit Reg(const Op2Reg& op) { memcpy(this, &op, sizeof(*this)); }
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:379:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data_[kPageSize];  // The cached data.
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:381:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char validity_map_[kValidityMapSize];  // One byte per line.
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:583:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line_buf[256];
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:615:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(new_result, result.get(), offset * sizeof(char));
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:619:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(result.get() + offset, line_buf, len * sizeof(char));
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:638:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmd[COMMAND_SIZE + 1];
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:639:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arg1[ARG_SIZE + 1];
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:640:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arg2[ARG_SIZE + 1];
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1060:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cached_line, line, CachePage::kLineLength);
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1279:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[2 * sizeof(vfp_registers_[0])];
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1280:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, &registers_[reg], 2 * sizeof(registers_[0]));
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1281:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&dm_val, buffer, 2 * sizeof(registers_[0]));
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1287:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(registers_ + reg, value, sizeof(*value));
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1298:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(value, vfp_registers_ + dreg * 2, sizeof(*value));
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1303:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(vfp_registers_ + dreg * 2, value, sizeof(*value));
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1308:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(value, vfp_registers_ + dreg * 2, sizeof(*value) * 2);
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1313:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(vfp_registers_ + dreg * 2, value, sizeof(*value) * 2);
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1318:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(value, vfp_registers_ + qreg * 4, sizeof(*value) * 2);
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1323:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(vfp_registers_ + qreg * 4, value, sizeof(*value) * 2);
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1328:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(value, vfp_registers_ + qreg * 4, sizeof(*value) * 4);
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1333:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(vfp_registers_ + qreg * 4, value, sizeof(*value) * 4);
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1364:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[register_size * sizeof(vfp_registers_[0])];
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1365:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, &value, register_size * sizeof(vfp_registers_[0]));
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1366:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&vfp_registers_[reg_index * register_size], buffer,
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1376:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[register_size * sizeof(vfp_registers_[0])];
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1377:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, &vfp_registers_[register_size * reg_index],
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1379:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(out, buffer, register_size * sizeof(vfp_registers_[0]));
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1407:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[2 * sizeof(stack[0])];
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1408:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, stack, 2 * sizeof(stack[0]));
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1409:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(x, buffer, 2 * sizeof(stack[0]));
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1415:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[2 * sizeof(vfp_registers_[0])];
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1418:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(vfp_registers_, buffer, sizeof(buffer));
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1420:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[2 * sizeof(registers_[0])];
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1423:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(registers_, buffer, sizeof(buffer));
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1429:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(registers_[0])];
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1432:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(vfp_registers_, buffer, sizeof(buffer));
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1434:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(registers_[0])];
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1437:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(registers_, buffer, sizeof(buffer));
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1506:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, &value, sizeof(value));
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1554:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, &value, sizeof(value));
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1675:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, &value, sizeof(value));
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:1697:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, &value, sizeof(value));
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:2282:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&d, data, 8);
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:2288:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(data, &d, 8);
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:4204:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(data, &dd_value, 8);
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:4206:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&dd_value, data, 8);
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:4215:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(data, &dn_value, 8);
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:4629:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(data, &d, 8);
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:4635:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&d, data, 8);
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:4655:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&val, &data, 8);
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:4662:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&data, &val, 8);
data/mozjs78-78.4.0/js/src/jit/arm/disasm/Constants-arm.cpp:32:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&d, &imm, 8);
data/mozjs78-78.4.0/js/src/jit/arm64/Assembler-arm64.h:219:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dest, jumpRelocations_.buffer(), jumpRelocations_.length());
data/mozjs78-78.4.0/js/src/jit/arm64/Assembler-arm64.h:224:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dest, dataRelocations_.buffer(), dataRelocations_.length());
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Debugger-vixl.cpp:729:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[kMaxDebugShellLine];
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:2618:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char re_form[sizeof(form_4v) + 6];
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3514:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buffer[1024];
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Globals-vixl.h:161:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  typedef char VIXL_CONCAT(STATIC_ASSERT_LINE_, line)[(condition) ? 1 : -1] \
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instructions-vixl.h:432:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(LiteralAddress<void*>(), &literal, sizeof(literal));
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instructions-vixl.h:798:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char form_buffer_[64];
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instructions-vixl.h:799:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mne_buffer_[16];
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instrument-vixl.cpp:127:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    output_stream_ = fopen(datafile, "w");
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instrument-vixl.h:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name_[kCounterNameMaxLength];
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MacroAssembler-vixl.cpp:524:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(bytes, &imm, sizeof(imm));
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozBaseAssembler-vixl.h:155:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[2048];
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozBaseAssembler-vixl.h:164:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[2048];
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozBaseAssembler-vixl.h:167:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char labelBuf[128];
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozBaseAssembler-vixl.h:199:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[2048];
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozBaseAssembler-vixl.h:202:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char litbuf[2048];
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozBaseAssembler-vixl.h:251:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(at, &instruction, sizeof(instruction));
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MozInstructions-vixl.cpp:207:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(this, &me, sizeof(me));
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-vixl.cpp:3921:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char * chunks[kPrintfMaxArgCount];
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-vixl.h:79:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(reinterpret_cast<char *>(address), &value, sizeof(value));
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-vixl.h:97:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(value_, &new_value, sizeof(new_value));
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-vixl.h:110:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&value_[lane * sizeof(new_value)], &new_value, sizeof(new_value));
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-vixl.h:691:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&raw, &value, sizeof(value));
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Utils-vixl.cpp:62:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&bits, &value, 4);
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Utils-vixl.cpp:69:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&bits, &value, 8);
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Utils-vixl.cpp:83:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&value, &bits, 4);
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Utils-vixl.cpp:90:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&value, &bits, 8);
data/mozjs78-78.4.0/js/src/jit/mips-shared/Architecture-mips-shared.cpp:37:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen("/proc/cpuinfo", "r");
data/mozjs78-78.4.0/js/src/jit/mips-shared/Architecture-mips-shared.cpp:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.cpp:101:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, jumpRelocations_.buffer(), jumpRelocations_.length());
data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.cpp:107:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, dataRelocations_.buffer(), dataRelocations_.length());
data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.h:696:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buffer, &cur->instructions, cur->length());
data/mozjs78-78.4.0/js/src/jit/mips-shared/Assembler-mips-shared.h:877:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/mozjs78-78.4.0/js/src/jit/mips-shared/AtomicOperations-mips-shared.h:466:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ::memcpy(dest, src, nbytes);
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:470:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data_[kPageSize];  // The cached data.
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:472:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char validity_map_[kValidityMapSize];  // One byte per line.
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:685:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char lineBuf[256];
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:716:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(new_result, result.get(), offset * sizeof(char));
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:720:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(result.get() + offset, lineBuf, len * sizeof(char));
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:731:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hexbytes[256];
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:732:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(hexbytes, "0x%x 0x%x 0x%x 0x%x", bytes[0], bytes[1], bytes[2],
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:734:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char llvmcmd[1024];
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:755:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmd[COMMAND_SIZE + 1];
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:756:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arg1[ARG_SIZE + 1];
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:757:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arg2[ARG_SIZE + 1];
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:1137:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cached_line, line, CachePage::kLineLength);
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:1412:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(x, stack, sizeof(double));
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:511:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data_[kPageSize];  // The cached data.
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:513:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char validity_map_[kValidityMapSize];  // One byte per line.
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:718:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char lineBuf[256];
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:749:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(new_result, result.get(), offset * sizeof(char));
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:753:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(result.get() + offset, lineBuf, len * sizeof(char));
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:764:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hexbytes[256];
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:765:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(hexbytes, "0x%x 0x%x 0x%x 0x%x", bytes[0], bytes[1], bytes[2],
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:767:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char llvmcmd[1024];
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:788:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmd[COMMAND_SIZE + 1];
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:789:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arg1[ARG_SIZE + 1];
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:790:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arg2[ARG_SIZE + 1];
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:1164:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cached_line, line, CachePage::kLineLength);
data/mozjs78-78.4.0/js/src/jit/shared/AtomicOperations-feeling-lucky-gcc.h:440:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ::memcpy(dest, src, nbytes);
data/mozjs78-78.4.0/js/src/jit/shared/AtomicOperations-feeling-lucky-msvc.h:364:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ::memcpy(dest, src, nbytes);
data/mozjs78-78.4.0/js/src/jit/shared/CodeGenerator-shared.cpp:732:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(data, writer.buffer(), writer.length());
data/mozjs78-78.4.0/js/src/jit/shared/Disassembler-shared.cpp:71:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fmt2[1024];
data/mozjs78-78.4.0/js/src/jit/shared/IonAssemblerBuffer.h:117:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&instructions[length()], source, numBytes);
data/mozjs78-78.4.0/js/src/jit/shared/IonAssemblerBufferWithConstantPools.h:1166:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dest, &cur->instructions[0], cur->length());
data/mozjs78-78.4.0/js/src/jit/x64/Lowering-x64.cpp:1262:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char buf[256];
data/mozjs78-78.4.0/js/src/jit/x86-shared/Assembler-x86-shared.cpp:33:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, jumpRelocations_.buffer(), jumpRelocations_.length());
data/mozjs78-78.4.0/js/src/jit/x86-shared/Assembler-x86-shared.cpp:39:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, dataRelocations_.buffer(), dataRelocations_.length());
data/mozjs78-78.4.0/js/src/jit/x86-shared/AssemblerBuffer-x86-shared.cpp:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[200];
data/mozjs78-78.4.0/js/src/jit/x86-shared/BaseAssembler-x86-shared.h:3946:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, src, size());
data/mozjs78-78.4.0/js/src/jit/x86-shared/Patching-x86-shared.h:17:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&res, (const char*)where - sizeof(void*), sizeof(void*));
data/mozjs78-78.4.0/js/src/jit/x86-shared/Patching-x86-shared.h:22:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char*)where - sizeof(void*), &value, sizeof(void*));
data/mozjs78-78.4.0/js/src/jit/x86-shared/Patching-x86-shared.h:27:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&res, (const char*)where - sizeof(int32_t), sizeof(int32_t));
data/mozjs78-78.4.0/js/src/jit/x86-shared/Patching-x86-shared.h:32:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char*)where - sizeof(int32_t), &value, sizeof(int32_t));
data/mozjs78-78.4.0/js/src/jsapi-tests/testBinASTReader.cpp:53:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  gJsDirectory = open(".", O_RDONLY);
data/mozjs78-78.4.0/js/src/jsapi-tests/testBinASTReader.cpp:77:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char gJsDirectory[MAX_PATH] = {0};
data/mozjs78-78.4.0/js/src/jsapi-tests/testBinASTReader.cpp:93:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char destination[MAX_PATH];
data/mozjs78-78.4.0/js/src/jsapi-tests/testBinASTReader.cpp:129:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* in = fopen(path, "rb");
data/mozjs78-78.4.0/js/src/jsapi-tests/testBinASTReader.cpp:449:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            auto fd = open("/tmp/bin.ast", O_CREAT | O_TRUNC | O_WRONLY, 0666);
data/mozjs78-78.4.0/js/src/jsapi-tests/testBinASTReader.cpp:462:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            fd = open("/tmp/txt.ast", O_CREAT | O_TRUNC | O_WRONLY, 0666);
data/mozjs78-78.4.0/js/src/jsapi-tests/testDeflateStringToUTF8Buffer.cpp:18:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char actual[100];
data/mozjs78-78.4.0/js/src/jsapi-tests/testGCExactRooting.cpp:153:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[2];
data/mozjs78-78.4.0/js/src/jsapi-tests/testGCExactRooting.cpp:183:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[2];
data/mozjs78-78.4.0/js/src/jsapi-tests/testGCExactRooting.cpp:217:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[2];
data/mozjs78-78.4.0/js/src/jsapi-tests/testGCExactRooting.cpp:264:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[2];
data/mozjs78-78.4.0/js/src/jsapi-tests/testGCExactRooting.cpp:333:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[2];
data/mozjs78-78.4.0/js/src/jsapi-tests/testGCExactRooting.cpp:368:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[2];
data/mozjs78-78.4.0/js/src/jsapi-tests/testMappedArrayBuffer.cpp:29:33:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* test_stream = test_file.open(test_filename);
data/mozjs78-78.4.0/js/src/jsapi-tests/testMappedArrayBuffer.cpp:69:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = open(test_filename, O_RDONLY);
data/mozjs78-78.4.0/js/src/jsapi-tests/testMappedArrayBuffer.cpp:113:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = open(test_filename, O_RDONLY);
data/mozjs78-78.4.0/js/src/jsapi-tests/testNumberToString.cpp:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char out[JS::MaximumNumberToStringLength];
data/mozjs78-78.4.0/js/src/jsapi-tests/testReadableStream.cpp:52:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer, testBufferData, length);
data/mozjs78-78.4.0/js/src/jsapi-tests/testScriptObject.cpp:131:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* script_stream = tempScript.open(script_filename);
data/mozjs78-78.4.0/js/src/jsapi-tests/testScriptObject.cpp:150:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  tempScript.open(script_filename);
data/mozjs78-78.4.0/js/src/jsapi-tests/testScriptObject.cpp:167:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* script_stream = tempScript.open("temp-bug438633_JS_CompileFileHandle");
data/mozjs78-78.4.0/js/src/jsapi-tests/testScriptObject.cpp:184:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      tempScript.open("temp-bug438633_JS_CompileFileHandle_empty");
data/mozjs78-78.4.0/js/src/jsapi-tests/testScriptObject.cpp:200:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      tempScript.open("temp-bug438633_JS_CompileFileHandleForPrincipals");
data/mozjs78-78.4.0/js/src/jsapi-tests/tests.h:125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[2] = {c, '\0'};
data/mozjs78-78.4.0/js/src/jsapi-tests/tests.h:130:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[40];
data/mozjs78-78.4.0/js/src/jsapi-tests/tests.h:131:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "%ld", v);
data/mozjs78-78.4.0/js/src/jsapi-tests/tests.h:136:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[40];
data/mozjs78-78.4.0/js/src/jsapi-tests/tests.h:137:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "%lu", v);
data/mozjs78-78.4.0/js/src/jsapi-tests/tests.h:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[40];
data/mozjs78-78.4.0/js/src/jsapi-tests/tests.h:143:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "%lld", v);
data/mozjs78-78.4.0/js/src/jsapi-tests/tests.h:148:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[40];
data/mozjs78-78.4.0/js/src/jsapi-tests/tests.h:149:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "%llu", v);
data/mozjs78-78.4.0/js/src/jsapi-tests/tests.h:154:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[40];
data/mozjs78-78.4.0/js/src/jsapi-tests/tests.h:266:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char location[256];
data/mozjs78-78.4.0/js/src/jsapi-tests/tests.h:435:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* open(const char* fileName) {
data/mozjs78-78.4.0/js/src/jsapi-tests/tests.h:436:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    stream = fopen(fileName, "wb+");
data/mozjs78-78.4.0/js/src/jsapi.cpp:145:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char requiredArgsStr[40];
data/mozjs78-78.4.0/js/src/jsapi.cpp:147:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char actualArgsStr[40];
data/mozjs78-78.4.0/js/src/jsdate.cpp:2673:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100];
data/mozjs78-78.4.0/js/src/jsdate.cpp:2705:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100];
data/mozjs78-78.4.0/js/src/jsdate.cpp:2849:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tzbuf[100];
data/mozjs78-78.4.0/js/src/jsdate.cpp:2930:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100];
data/mozjs78-78.4.0/js/src/jsdate.cpp:2978:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100];
data/mozjs78-78.4.0/js/src/jsfriendapi.cpp:1165:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[1024];
data/mozjs78-78.4.0/js/src/jsfriendapi.cpp:1169:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(name, "<unknown>");
data/mozjs78-78.4.0/js/src/jsfriendapi.cpp:1187:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cellDesc[1024 * 32];
data/mozjs78-78.4.0/js/src/jsfriendapi.cpp:1208:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[1024];
data/mozjs78-78.4.0/js/src/jsnum.cpp:800:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[JSFatInlineString::MAX_LENGTH_TWO_BYTE + 1];
data/mozjs78-78.4.0/js/src/jsnum.cpp:1073:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[DTOSTR_VARIABLE_BUFFER_SIZE(MAX_PRECISION + 1)];
data/mozjs78-78.4.0/js/src/jsnum.h:78:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sbuf[sbufSize];
data/mozjs78-78.4.0/js/src/new-regexp/regexp-compiler.cc:939:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char templ[kSize];
data/mozjs78-78.4.0/js/src/new-regexp/regexp-macro-assembler-tracer.cc:194:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer_[4];
data/mozjs78-78.4.0/js/src/new-regexp/regexp-shim.cc:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[10];
data/mozjs78-78.4.0/js/src/new-regexp/regexp-shim.cc:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[13];
data/mozjs78-78.4.0/js/src/new-regexp/regexp-shim.h:79:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define MemCopy memcpy
data/mozjs78-78.4.0/js/src/new-regexp/util/zone.h:148:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(data_ + length_, other.begin(), sizeof(*data_) * other.length());
data/mozjs78-78.4.0/js/src/new-regexp/util/zone.h:250:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(new_data, data_, length_ * sizeof(T));
data/mozjs78-78.4.0/js/src/shell/OSObject.cpp:134:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[PATH_MAX + 1];
data/mozjs78-78.4.0/js/src/shell/OSObject.cpp:172:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen(pathname.get(), "rb");
data/mozjs78-78.4.0/js/src/shell/OSObject.cpp:256:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[PATH_MAX + 1];
data/mozjs78-78.4.0/js/src/shell/OSObject.cpp:440:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen(filename.get(), "wb");
data/mozjs78-78.4.0/js/src/shell/OSObject.cpp:484:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen(filename, mode);
data/mozjs78-78.4.0/js/src/shell/OSObject.cpp:884:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[200];
data/mozjs78-78.4.0/js/src/shell/js.cpp:1501:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    file = fopen(filename, "rb");
data/mozjs78-78.4.0/js/src/shell/js.cpp:1611:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen(filename.get(), "rb");
data/mozjs78-78.4.0/js/src/shell/js.cpp:2358:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char loadLengthStr[16];
data/mozjs78-78.4.0/js/src/shell/js.cpp:2360:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char saveLengthStr[16];
data/mozjs78-78.4.0/js/src/shell/js.cpp:2400:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  file = fopen(pathname.get(), "rb");
data/mozjs78-78.4.0/js/src/shell/js.cpp:3573:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char linebuf[lineBufLen];
data/mozjs78-78.4.0/js/src/shell/js.cpp:3589:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE* file = fopen(script->filename(), "rb");
data/mozjs78-78.4.0/js/src/shell/js.cpp:6147:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int stdInReader = atoi(sArgv[fdsIndex + 0]);
data/mozjs78-78.4.0/js/src/shell/js.cpp:6148:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int stdInWriter = atoi(sArgv[fdsIndex + 1]);
data/mozjs78-78.4.0/js/src/shell/js.cpp:6149:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int stdOutReader = atoi(sArgv[fdsIndex + 2]);
data/mozjs78-78.4.0/js/src/shell/js.cpp:6150:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int stdOutWriter = atoi(sArgv[fdsIndex + 3]);
data/mozjs78-78.4.0/js/src/shell/js.cpp:7227:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dstBytes->begin(), src->begin(), src->length());
data/mozjs78-78.4.0/js/src/shell/js.cpp:7274:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer->dataPointer(), bytes.begin(), bytes.length());
data/mozjs78-78.4.0/js/src/shell/js.cpp:7305:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(bytes.begin(), ptr.unwrap(), numBytes);
data/mozjs78-78.4.0/js/src/shell/js.cpp:7503:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(bytes.begin(), dataPointer.unwrap(), byteLength);
data/mozjs78-78.4.0/js/src/shell/js.cpp:8065:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(binary->as<TypedArrayObject>().dataPointerUnshared(), bytes.begin(),
data/mozjs78-78.4.0/js/src/shell/js.cpp:10049:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE* out = fopen(filename, "a");
data/mozjs78-78.4.0/js/src/shell/js.cpp:10909:39:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (outPath && *outPath && (newfp = fopen(outPath, "w"))) {
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:304:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      opt->asIntOption()->value = atoi(value);
data/mozjs78-78.4.0/js/src/shell/jsrtfuzzing/jsrtfuzzing.cpp:102:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, buf, size);
data/mozjs78-78.4.0/js/src/shell/jsshell.cpp:90:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cbuf[100];
data/mozjs78-78.4.0/js/src/threading/posix/PosixThread.cpp:91:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nameBuf[16];
data/mozjs78-78.4.0/js/src/util/CompleteFile.cpp:61:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
bool js::AutoFile::open(JSContext* cx, const char* filename) {
data/mozjs78-78.4.0/js/src/util/CompleteFile.cpp:65:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp_ = fopen(filename, "r");
data/mozjs78-78.4.0/js/src/util/CompleteFile.h:41:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  bool open(JSContext* cx, const char* filename);
data/mozjs78-78.4.0/js/src/util/Memory.h:25:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  return memcpy(dst, src, len);
data/mozjs78-78.4.0/js/src/util/NativeStack.cpp:159:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE* fs = fopen((const char*)path, "r");
data/mozjs78-78.4.0/js/src/util/NativeStack.cpp:162:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char line[100];
data/mozjs78-78.4.0/js/src/util/StructuredSpewer.cpp:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[2048] = {0};
data/mozjs78-78.4.0/js/src/util/StructuredSpewer.cpp:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char suffix_path[2048] = {0};
data/mozjs78-78.4.0/js/src/util/StructuredSpewer.cpp:88:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char signature[2048] = {0};
data/mozjs78-78.4.0/js/src/vm/ArrayBufferObject.cpp:460:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dataCopy.get(), buffer->dataPointer(), count);
data/mozjs78-78.4.0/js/src/vm/ArrayBufferObject.cpp:1090:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(newBuf->dataPointer(), oldBuf->dataPointer(), oldBuf->byteLength());
data/mozjs78-78.4.0/js/src/vm/ArrayBufferObject.cpp:1490:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(toBuffer->dataPointer() + toIndex,
data/mozjs78-78.4.0/js/src/vm/BigIntType.cpp:1296:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resultChars[maxLength];
data/mozjs78-78.4.0/js/src/vm/BigIntType.cpp:1812:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[JS::MaximumNumberToStringLength];
data/mozjs78-78.4.0/js/src/vm/BytecodeUtil.cpp:1383:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char numBuf1[12], numBuf2[12];
data/mozjs78-78.4.0/js/src/vm/BytecodeUtil.cpp:1626:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char numBuf[12];
data/mozjs78-78.4.0/js/src/vm/BytecodeUtil.h:86:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&result, pc, 4);
data/mozjs78-78.4.0/js/src/vm/BytecodeUtil.h:97:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pc + 1, &i, 3);
data/mozjs78-78.4.0/js/src/vm/Caches.h:122:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char templateObject[MAX_OBJ_SIZE];
data/mozjs78-78.4.0/js/src/vm/CharacterEncoding.cpp:220:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[10];
data/mozjs78-78.4.0/js/src/vm/CharacterEncoding.cpp:232:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[10];
data/mozjs78-78.4.0/js/src/vm/CodeCoverage.cpp:468:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[1024];
data/mozjs78-78.4.0/js/src/vm/CodeCoverage.cpp:548:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[1024];
data/mozjs78-78.4.0/js/src/vm/CodeCoverage.cpp:566:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[1024];
data/mozjs78-78.4.0/js/src/vm/CompilationAndEvaluation.cpp:114:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (!file.open(cx, filename)) {
data/mozjs78-78.4.0/js/src/vm/CompilationAndEvaluation.cpp:538:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!file.open(cx, filename) || !file.readAll(cx, buffer)) {
data/mozjs78-78.4.0/js/src/vm/DateTime.cpp:630:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char linkName[PathMax];
data/mozjs78-78.4.0/js/src/vm/DateTime.cpp:641:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char linkTarget[PathMax];
data/mozjs78-78.4.0/js/src/vm/GeckoProfiler.cpp:306:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char lineAndColumnStr[30];
data/mozjs78-78.4.0/js/src/vm/GeckoProfiler.cpp:341:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(str.get() + cur, nameStr.get(), nameLength);
data/mozjs78-78.4.0/js/src/vm/GeckoProfiler.cpp:348:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(str.get() + cur, filenameStr, filenameLength);
data/mozjs78-78.4.0/js/src/vm/GeckoProfiler.cpp:354:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(str.get() + cur, lineAndColumnStr, lineAndColumnLength);
data/mozjs78-78.4.0/js/src/vm/Interpreter.cpp:4567:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char numBuf[12];
data/mozjs78-78.4.0/js/src/vm/JSContext.cpp:1195:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msgbuf[1024];
data/mozjs78-78.4.0/js/src/vm/JSONParser.cpp:85:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char columnNumber[MaxWidth];
data/mozjs78-78.4.0/js/src/vm/JSONParser.cpp:87:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lineNumber[MaxWidth];
data/mozjs78-78.4.0/js/src/vm/JSONPrinter.cpp:172:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[DTOSTR_STANDARD_BUFFER_SIZE];
data/mozjs78-78.4.0/js/src/vm/JSObject.cpp:1657:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[mozilla::tl::Max<sizeof(JSFunction),
data/mozjs78-78.4.0/js/src/vm/JSObject.cpp:1726:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[sizeof(JSObject_Slots0)];
data/mozjs78-78.4.0/js/src/vm/JSScript.cpp:3717:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char linenoBuf[15];
data/mozjs78-78.4.0/js/src/vm/NativeObject-inl.h:168:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(reinterpret_cast<Value*>(&elements_[dstStart]), src,
data/mozjs78-78.4.0/js/src/vm/NativeObject-inl.h:196:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(reinterpret_cast<Value*>(elements_), src, count * sizeof(Value));
data/mozjs78-78.4.0/js/src/vm/Printer.cpp:413:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  file_ = fopen(path, "w");
data/mozjs78-78.4.0/js/src/vm/Scope.h:131:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  alignas(BindingName) unsigned char data_[sizeof(BindingName)];
data/mozjs78-78.4.0/js/src/vm/SelfHosting.cpp:1454:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(unsafeTargetDataCrossCompartment.unwrapUnshared(),
data/mozjs78-78.4.0/js/src/vm/StringType.h:1057:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char inlineStorageExtensionLatin1[INLINE_EXTENSION_CHARS_LATIN1];
data/mozjs78-78.4.0/js/src/vm/StringType.h:1178:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char inlineStorage_[sizeof(JSFatInlineString) - sizeof(JSString)];
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:892:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zeroes[sizeof(uint64_t)] = {0};
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:912:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zeroes[sizeof(uint64_t)] = {0};
data/mozjs78-78.4.0/js/src/vm/Time.cpp:371:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char real_year[16];
data/mozjs78-78.4.0/js/src/vm/Time.cpp:372:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fake_year[16];
data/mozjs78-78.4.0/js/src/vm/Time.cpp:377:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(real_year, "%d", prtm->tm_year);
data/mozjs78-78.4.0/js/src/vm/Time.cpp:379:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fake_year, "%d", fake_tm_year);
data/mozjs78-78.4.0/js/src/vm/Time.cpp:389:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p, real_year, real_year_len);
data/mozjs78-78.4.0/js/src/vm/TraceLogging.cpp:686:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buffer, eventString, length);
data/mozjs78-78.4.0/js/src/vm/TraceLogging.cpp:690:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buffer, eventString, bufferSize);
data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.cpp:101:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  out = fopen(filename.get(), "w");
data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.cpp:113:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (FILE* last = fopen(masterFilename.get(), "w")) {
data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.cpp:165:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[16];
data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.cpp:237:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    dictFile = fopen(dictFilename.get(), "w");
data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.cpp:248:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    treeFile = fopen(treeFilename.get(), "w+b");
data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.cpp:259:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    eventFile = fopen(eventFilename.get(), "wb");
data/mozjs78-78.4.0/js/src/vm/TypeInference.cpp:84:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char bufs[4][100];
data/mozjs78-78.4.0/js/src/vm/TypeInference.cpp:146:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100];
data/mozjs78-78.4.0/js/src/vm/TypeInference.cpp:249:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msgbuf[1024]; /* Larger error messages will be truncated */
data/mozjs78-78.4.0/js/src/vm/TypeInference.cpp:250:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf[1024];
data/mozjs78-78.4.0/js/src/vm/TypedArrayObject-inl.h:211:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  static void memcpy(SharedMem<T*> dest, SharedMem<T*> src, size_t size) {
data/mozjs78-78.4.0/js/src/vm/TypedArrayObject-inl.h:248:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  static void memcpy(SharedMem<T*> dest, SharedMem<T*> src, size_t size) {
data/mozjs78-78.4.0/js/src/vm/TypedArrayObject-inl.h:249:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    ::memcpy(dest.unwrapUnshared(), src.unwrapUnshared(), size);
data/mozjs78-78.4.0/js/src/vm/TypedArrayObject-inl.h:561:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    Ops::memcpy(SharedMem<void*>::unshared(data), source->dataPointerEither(),
data/mozjs78-78.4.0/js/src/vm/TypedArrayObject.cpp:124:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer->dataPointer(), tarray->dataPointerUnshared(),
data/mozjs78-78.4.0/js/src/vm/UbiNode.cpp:216:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[1024];
data/mozjs78-78.4.0/js/src/vm/Xdr.h:399:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ptr, bytes, len);
data/mozjs78-78.4.0/js/src/vm/Xdr.h:405:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(bytes, ptr, len);
data/mozjs78-78.4.0/js/src/vtune/VTuneWrapper.cpp:113:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char namebuf[512];
data/mozjs78-78.4.0/js/src/vtune/ittnotify_config.h:463:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char          magic[8];
data/mozjs78-78.4.0/js/src/vtune/ittnotify_static.c:269:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char dll_path[PATH_MAX] = { 0 };
data/mozjs78-78.4.0/js/src/vtune/ittnotify_static.c:806:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char  env_buff[MAX_ENV_VALUE_SIZE];
data/mozjs78-78.4.0/js/src/vtune/ittnotify_static.c:868:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char system_wide_marker_filename[PATH_MAX] = {0};
data/mozjs78-78.4.0/js/src/vtune/ittnotify_static.c:878:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        itt_marker_file_fd = open(system_wide_marker_filename, O_RDONLY);
data/mozjs78-78.4.0/js/src/vtune/ittnotify_static.c:883:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char cmdline_path[PATH_MAX] = {0};
data/mozjs78-78.4.0/js/src/vtune/ittnotify_static.c:884:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char package_name[PATH_MAX] = {0};
data/mozjs78-78.4.0/js/src/vtune/ittnotify_static.c:885:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char app_sandbox_file[PATH_MAX] = {0};
data/mozjs78-78.4.0/js/src/vtune/ittnotify_static.c:897:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            cmdline_fd = open(cmdline_path, O_RDONLY);
data/mozjs78-78.4.0/js/src/vtune/ittnotify_static.c:929:34:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            itt_marker_file_fd = open(app_sandbox_file, O_RDONLY);
data/mozjs78-78.4.0/js/src/vtune/ittnotify_static.c:938:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char itt_lib_name[PATH_MAX] = {0};
data/mozjs78-78.4.0/js/src/vtune/ittnotify_static.c:987:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char gr[255];
data/mozjs78-78.4.0/js/src/wasm/AsmJS.cpp:7023:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char timeChars[20];
data/mozjs78-78.4.0/js/src/wasm/WasmBaselineCompile.cpp:2243:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(bits.bytes, imm.bytes, 16);
data/mozjs78-78.4.0/js/src/wasm/WasmCode.cpp:373:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(codeBytes.get(), unlinkedBytes.begin(), codeLength);
data/mozjs78-78.4.0/js/src/wasm/WasmCompile.cpp:707:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, env.begin(), env.length());
data/mozjs78-78.4.0/js/src/wasm/WasmCompile.cpp:710:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, code.begin(), code.length());
data/mozjs78-78.4.0/js/src/wasm/WasmCompile.cpp:713:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, tail.begin(), tail.length());
data/mozjs78-78.4.0/js/src/wasm/WasmGenerator.cpp:1135:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(metadata_->debugHash, hash, sizeof(ModuleHash));
data/mozjs78-78.4.0/js/src/wasm/WasmInstance.cpp:917:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rawBuf + dstOffset, (const char*)seg.bytes.begin() + srcOffset, len);
data/mozjs78-78.4.0/js/src/wasm/WasmInstance.cpp:1373:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dst, &x, sizeof(x));
data/mozjs78-78.4.0/js/src/wasm/WasmInstance.cpp:1378:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dst, &x, sizeof(x));
data/mozjs78-78.4.0/js/src/wasm/WasmInstance.cpp:1383:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dst, &x, sizeof(x));
data/mozjs78-78.4.0/js/src/wasm/WasmInstance.cpp:1388:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dst, &x, sizeof(x));
data/mozjs78-78.4.0/js/src/wasm/WasmInstance.cpp:1393:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dst, &x, sizeof(x));
data/mozjs78-78.4.0/js/src/wasm/WasmInstance.cpp:1403:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dst, x.asJSObjectAddress(), sizeof(*x.asJSObjectAddress()));
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:683:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(serialized->begin(), bytes->begin(), bytes->length());
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:1270:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf->dataPointer(), cs.payload->begin(), cs.payload->length());
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:3688:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(codeBytesEnd_, begin, copyLength);
data/mozjs78-78.4.0/js/src/wasm/WasmModule.cpp:423:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(code->as<TypedArrayObject>().dataPointerUnshared(),
data/mozjs78-78.4.0/js/src/wasm/WasmModule.cpp:620:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(memoryBase + offset, seg->bytes.begin(), count);
data/mozjs78-78.4.0/js/src/wasm/WasmModule.cpp:1174:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[20];
data/mozjs78-78.4.0/js/src/wasm/WasmSerialize.h:35:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, src, nbytes);
data/mozjs78-78.4.0/js/src/wasm/WasmSerialize.h:43:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, src, nbytes);
data/mozjs78-78.4.0/js/src/wasm/WasmSerialize.h:54:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst, src, nbytes);
data/mozjs78-78.4.0/js/src/wasm/WasmSerialize.h:61:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst, &t, sizeof(t));
data/mozjs78-78.4.0/js/src/wasm/WasmSerialize.h:67:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst, src, sizeof(*dst));
data/mozjs78-78.4.0/js/src/wasm/WasmSerialize.h:77:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst, src, sizeof(*dst));
data/mozjs78-78.4.0/js/src/wasm/WasmSignalHandlers.cpp:650:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, &val, sizeof(val));
data/mozjs78-78.4.0/js/src/wasm/WasmSignalHandlers.cpp:666:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, &val, sizeof(val));
data/mozjs78-78.4.0/js/src/wasm/WasmTypes.h:619:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&result, bytes + sizeof(T) * lane, sizeof(T));
data/mozjs78-78.4.0/js/src/wasm/WasmTypes.h:626:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(bytes + sizeof(T) * lane, &value, sizeof(T));
data/mozjs78-78.4.0/js/src/wasm/WasmValidate.cpp:1801:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(name.get(), bytes, numBytes);
data/mozjs78-78.4.0/js/src/wasm/WasmValidate.h:487:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void*)out, cur_, sizeof(T));
data/mozjs78-78.4.0/js/src/wasm/WasmValidate.h:496:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ret, cur_, sizeof(T));
data/mozjs78-78.4.0/js/src/wasm/WasmValidate.h:504:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ret, cur_, sizeof(T));
data/mozjs78-78.4.0/js/src/zydis/Zycore/Format.c:94:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[ZYCORE_MAXCHARS_DEC_32];
data/mozjs78-78.4.0/js/src/zydis/Zycore/Format.c:140:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[ZYCORE_MAXCHARS_DEC_64];
data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h:112:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define ZYAN_MEMCPY     memcpy
data/mozjs78-78.4.0/js/src/zydis/Zydis/Formatter.h:859:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[11];
data/mozjs78-78.4.0/js/src/zydis/Zydis/ZydisString.c:74:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[ZYDIS_MAXCHARS_DEC_32];
data/mozjs78-78.4.0/js/src/zydis/Zydis/ZydisString.c:118:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[ZYDIS_MAXCHARS_DEC_64];
data/mozjs78-78.4.0/js/src/zydis/ZydisAPI.cpp:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[1024];
data/mozjs78-78.4.0/js/src/zydis/ZydisAPI.cpp:61:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buffer, "%08" PRIX64 "  ", runtime_address);
data/mozjs78-78.4.0/js/src/zydis/ZydisAPI.cpp:82:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buffer, "%-" LIMSTR "s", "");
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:196:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char mozillaMallocOptionsBuf[64];
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:1481:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:3485:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ret, aPtr, copysize);
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:3805:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ret, aPtr, copysize);
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:3954:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char cbuf[2];
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:4586:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t replace_malloc_lib[1024];
data/mozjs78-78.4.0/memory/mozalloc/mozalloc.cpp:102:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(newPtr, ptr, size);
data/mozjs78-78.4.0/memory/mozalloc/mozalloc_abort.cpp:76:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg[64] = {};
data/mozjs78-78.4.0/memory/mozalloc/throw_gcc.h:129:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error[128];
data/mozjs78-78.4.0/memory/mozalloc/throw_gcc.h:137:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error[128];
data/mozjs78-78.4.0/mfbt/Alignment.h:121:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mBytes[sizeof(T)];
data/mozjs78-78.4.0/mfbt/Assertions.cpp:21:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char sPrintfCrashReason[sPrintfCrashReasonSize] = {};
data/mozjs78-78.4.0/mfbt/Assertions.h:173:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[buflen + 1];  // 1 for trailing '\n'
data/mozjs78-78.4.0/mfbt/BufferList.h:143:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(Start() + offset, segment.mData, segment.mSize);
data/mozjs78-78.4.0/mfbt/BufferList.h:416:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, aData + copied, toCopy);
data/mozjs78-78.4.0/mfbt/BufferList.h:463:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(aData + copied, aIter.Data(), toCopy);
data/mozjs78-78.4.0/mfbt/Casting.h:55:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  std::memcpy(static_cast<void*>(aResult), static_cast<const void*>(&aFrom),
data/mozjs78-78.4.0/mfbt/EndianUtils.h:286:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(aDest, aSrc, aCount * sizeof(T));
data/mozjs78-78.4.0/mfbt/EndianUtils.h:297:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(byteDestPtr, u.mBuffer, sizeof(T));
data/mozjs78-78.4.0/mfbt/EndianUtils.h:312:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(aDest, aSrc, aCount * sizeof(T));
data/mozjs78-78.4.0/mfbt/EndianUtils.h:322:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(u.mBuffer, byteSrcPtr, sizeof(T));
data/mozjs78-78.4.0/mfbt/EndianUtils.h:570:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(u.mBuffer, aPtr, sizeof(T));
data/mozjs78-78.4.0/mfbt/EndianUtils.h:581:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(aPtr, &tmp, sizeof(T));
data/mozjs78-78.4.0/mfbt/FStream.h:39:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  void open(char16ptr_t filename, openmode mode = in);
data/mozjs78-78.4.0/mfbt/FStream.h:48:3:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  open(filename, mode);
data/mozjs78-78.4.0/mfbt/FStream.h:51:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
inline void IFStream::open(char16ptr_t filename, openmode mode) {
data/mozjs78-78.4.0/mfbt/FStream.h:70:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  void open(char16ptr_t filename, openmode mode = out);
data/mozjs78-78.4.0/mfbt/FStream.h:79:3:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  open(filename, mode);
data/mozjs78-78.4.0/mfbt/FStream.h:82:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
inline void OFStream::open(char16ptr_t filename, openmode mode) {
data/mozjs78-78.4.0/mfbt/FStream.h:103:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  void open(char16ptr_t filename, openmode mode = in) {
data/mozjs78-78.4.0/mfbt/FStream.h:104:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    std::ifstream::open(filename, mode);
data/mozjs78-78.4.0/mfbt/FStream.h:113:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  void open(char16ptr_t filename, openmode mode = out) {
data/mozjs78-78.4.0/mfbt/FStream.h:114:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    std::ofstream::open(filename, mode);
data/mozjs78-78.4.0/mfbt/HashFunctions.cpp:25:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&data, b + i, sizeof(size_t));
data/mozjs78-78.4.0/mfbt/HashTable.h:1024:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  alignas(NonConstT) unsigned char mValueData[sizeof(NonConstT)];
data/mozjs78-78.4.0/mfbt/HashTable.h:1631:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[sizeof(HashNumber) + sizeof(typename Entry::NonConstT)];
data/mozjs78-78.4.0/mfbt/JSONWriter.cpp:16:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char gTwoCharEscapes[256] = {
data/mozjs78-78.4.0/mfbt/JSONWriter.h:126:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern MFBT_DATA const char gTwoCharEscapes[256];
data/mozjs78-78.4.0/mfbt/JSONWriter.h:380:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/mozjs78-78.4.0/mfbt/JSONWriter.h:393:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[buflen];
data/mozjs78-78.4.0/mfbt/Maybe.h:55:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(static_cast<char*>(p) + offset * sizeof(poisonValue), &poisonValue,
data/mozjs78-78.4.0/mfbt/MaybeOneOf.h:47:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  alignas(StorageAlignment) unsigned char storage[StorageSize];
data/mozjs78-78.4.0/mfbt/PodOperations.h:87:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(reinterpret_cast<char*>(aDst), reinterpret_cast<const char*>(aSrc),
data/mozjs78-78.4.0/mfbt/PodOperations.h:108:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(aDst, aSrc, aNElem * sizeof(T));
data/mozjs78-78.4.0/mfbt/Poison.h:42:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, &POISON, sizeof(POISON));
data/mozjs78-78.4.0/mfbt/RandomNum.cpp:129:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = open("/dev/urandom", O_RDONLY);
data/mozjs78-78.4.0/mfbt/SHA1.cpp:99:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mU.mB + lenB, data, togo);
data/mozjs78-78.4.0/mfbt/SHA1.cpp:115:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mU.mB, data, aLen);
data/mozjs78-78.4.0/mfbt/SHA1.cpp:149:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(aHashOut, mU.mW, 20);
data/mozjs78-78.4.0/mfbt/SegmentedVector.h:65:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char mData[sizeof(T) * SegmentCapacity];
data/mozjs78-78.4.0/mfbt/Variant.h:550:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  alignas(RawDataAlignment) unsigned char rawData[RawDataSize];
data/mozjs78-78.4.0/mfbt/Vector.h:361:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    alignas(T) unsigned char mBytes[Capacity * sizeof(T)];
data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/double-to-string.cc:102:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[kMaxExponentLength + 1];
data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/double-to-string.cc:179:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char decimal_rep[kDecimalRepCapacity];
data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/double-to-string.cc:224:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char decimal_rep[kDecimalRepCapacity];
data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/double-to-string.cc:257:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char decimal_rep[kDecimalRepCapacity];
data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/double-to-string.cc:314:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char decimal_rep[kDecimalRepCapacity];
data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/string-to-double.cc:446:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[kBufferSize];  // NOLINT: size is known at compile time.
data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/strtod.cc:491:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char copy_buffer[kMaxSignificantDecimalDigits];
data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/strtod.cc:524:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char copy_buffer[kMaxSignificantDecimalDigits];
data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/utils.h:341:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  typedef char VerifySizesAreEqual[sizeof(Dest) == sizeof(Source) ? 1 : -1];
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:270:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(memPtr, &value, sizeof(value));
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:275:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(memPtr, &value, sizeof(value));
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:310:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    do { memcpy(d,s,8); d+=8; s+=8; } while (d<e);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:336:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dstPtr+4, srcPtr, 4);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:340:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dstPtr, srcPtr, 8);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:358:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    do { memcpy(d,s,16); memcpy(d+16,s+16,16); d+=32; s+=32; } while (d<e);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:358:26:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    do { memcpy(d,s,16); memcpy(d+16,s+16,16); d+=32; s+=32; } while (d<e);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:370:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(v, srcPtr, 2);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:371:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&v[2], srcPtr, 2);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:372:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&v[4], &v[0], 4);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:375:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(v, srcPtr, 4);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:376:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&v[4], srcPtr, 4);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:384:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dstPtr, v, 8);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:387:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dstPtr, v, 8);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1118:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(op, anchor, lastRun);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1483:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(streamPtr, streamPtr->dictCtx, sizeof(LZ4_stream_t));
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1687:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(op, ip, 16);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1691:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(op, ip, 8);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1692:37:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    if (length > 8) memcpy(op+8, ip+8, 8);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1724:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(op, match, 8);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1725:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(op+8, match+8, 8);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1726:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(op+16, match+16, 2);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1746:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(op, dictEnd - copySize, copySize);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1753:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(op, lowPrefix, restSize);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1794:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(op, ip, endOnInput ? 16 : 8);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1809:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(op + 0, match + 0, 8);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1810:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(op + 8, match + 8, 8);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1811:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(op +16, match +16, 2);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1847:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(op, ip, length);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1901:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(op, dictEnd - copySize, copySize);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1908:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(op, lowPrefix, restSize);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1926:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(op, match, mlen);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1939:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(op+4, match, 4);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1942:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(op, match, 8);
data/mozjs78-78.4.0/mfbt/lz4/lz4.c:1957:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(op, match, 8);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:506:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cdict->dictContent, dictStart, dictSize);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:751:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cSizePtr+BHSize, src, srcSize);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:849:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(cctxPtr->tmpIn + cctxPtr->tmpInSize, srcBuffer, srcSize);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:856:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(cctxPtr->tmpIn + cctxPtr->tmpInSize, srcBuffer, sizeToCopy);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:915:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cctxPtr->tmpIn, srcPtr, sizeToCopy);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:1156:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dctx->header, srcPtr, srcSize);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:1316:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dctx->tmpOutBuffer + preserveSize - copySize, oldDictEnd - copySize, copySize);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:1326:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dctx->tmpOutBuffer, dctx->dict + dctx->dictSize - preserveSize, preserveSize);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:1329:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dctx->tmpOutBuffer + dctx->dictSize, dstPtr, dstSize);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:1337:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dctx->tmpOutBuffer, dctx->dict + dctx->dictSize - preserveSize, preserveSize);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:1338:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dctx->tmpOutBuffer + preserveSize, dstPtr, dstSize);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:1408:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dctx->header + dctx->tmpInSize, srcPtr, sizeToCopy);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:1463:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dctx->tmpIn + dctx->tmpInSize, srcPtr, sizeToCopy);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:1506:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dstPtr, srcPtr, sizeToCopy);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:1546:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(dctx->header + dctx->tmpInSize, srcPtr, sizeToCopy);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:1578:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dctx->tmpIn + dctx->tmpInSize, srcPtr, sizeToCopy);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:1635:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(dctx->tmpOutBuffer, dctx->dict + dctx->dictSize - 64 KB, 64 KB);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:1671:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dstPtr, dctx->tmpOut + dctx->tmpOutStart, sizeToCopy);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:1712:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dctx->tmpIn + dctx->tmpInSize, srcPtr, sizeToCopy);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:1749:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dctx->header + dctx->tmpInSize, srcPtr, sizeToCopy);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:1798:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dctx->tmpOutBuffer + preserveSize - copySize, oldDictEnd - copySize, copySize);
data/mozjs78-78.4.0/mfbt/lz4/lz4frame.c:1807:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dctx->tmpOutBuffer, oldDictEnd - newDictSize, newDictSize);
data/mozjs78-78.4.0/mfbt/lz4/lz4hc.c:673:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(op, anchor, lastRunSize);
data/mozjs78-78.4.0/mfbt/lz4/lz4hc.c:795:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx, ctx->dictCtx, sizeof(LZ4HC_CCtx_internal));
data/mozjs78-78.4.0/mfbt/lz4/lz4hc.c:1462:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(op, anchor, lastRunSize);
data/mozjs78-78.4.0/mfbt/lz4/xxh3.h:388:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ret, ptr, sizeof(xxh_u64x2));
data/mozjs78-78.4.0/mfbt/lz4/xxh3.h:1388:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, &v64, sizeof(v64));
data/mozjs78-78.4.0/mfbt/lz4/xxh3.h:1479:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst_state, src_state, sizeof(*dst_state));
data/mozjs78-78.4.0/mfbt/lz4/xxh3.h:1633:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(acc, state->acc, sizeof(state->acc));
data/mozjs78-78.4.0/mfbt/lz4/xxh3.h:1652:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(lastStripe, state->buffer + sizeof(state->buffer) - catchupSize, catchupSize);
data/mozjs78-78.4.0/mfbt/lz4/xxh3.h:1653:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(lastStripe + catchupSize, state->buffer, state->bufferedSize);
data/mozjs78-78.4.0/mfbt/lz4/xxh3.h:2092:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, &hash.high64, sizeof(hash.high64));
data/mozjs78-78.4.0/mfbt/lz4/xxh3.h:2093:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char*)dst + sizeof(hash.high64), &hash.low64, sizeof(hash.low64));
data/mozjs78-78.4.0/mfbt/lz4/xxhash.h:321:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef struct { unsigned char digest[4]; } XXH32_canonical_t;
data/mozjs78-78.4.0/mfbt/lz4/xxhash.h:361:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef struct { unsigned char digest[8]; } XXH64_canonical_t;
data/mozjs78-78.4.0/mfbt/lz4/xxhash.h:542:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   XXH_ALIGN_MEMBER(64, unsigned char customSecret[XXH3_SECRET_DEFAULT_SIZE]);
data/mozjs78-78.4.0/mfbt/lz4/xxhash.h:543:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   XXH_ALIGN_MEMBER(64, unsigned char buffer[XXH3_INTERNALBUFFER_SIZE]);
data/mozjs78-78.4.0/mfbt/lz4/xxhash.h:653:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef struct { unsigned char digest[16]; } XXH128_canonical_t;
data/mozjs78-78.4.0/mfbt/lz4/xxhash.h:822:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    return memcpy(dest,src,size);
data/mozjs78-78.4.0/mfbt/lz4/xxhash.h:1295:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dstState, srcState, sizeof(*dstState));
data/mozjs78-78.4.0/mfbt/lz4/xxhash.h:1307:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(statePtr, &state, sizeof(state) - sizeof(state.reserved));
data/mozjs78-78.4.0/mfbt/lz4/xxhash.h:1414:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, &hash, sizeof(*dst));
data/mozjs78-78.4.0/mfbt/lz4/xxhash.h:1807:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dstState, srcState, sizeof(*dstState));
data/mozjs78-78.4.0/mfbt/lz4/xxhash.h:1819:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(statePtr, &state, sizeof(state) - sizeof(state.reserved64));
data/mozjs78-78.4.0/mfbt/lz4/xxhash.h:1915:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, &hash, sizeof(*dst));
data/mozjs78-78.4.0/mfbt/tests/TestBufferList.cpp:81:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char toWrite[kSmallWrite];
data/mozjs78-78.4.0/mfbt/tests/TestBufferList.cpp:122:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char toRead[kSmallWrite];
data/mozjs78-78.4.0/mfbt/tests/TestBufferList.cpp:279:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data[16];
data/mozjs78-78.4.0/mfbt/tests/TestEndian.cpp:181:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buffer + startPosition, aValues, nValues * sizeof(T));
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:16:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char gOutput[32];
data/mozjs78-78.4.0/mfbt/tests/TestIntegerPrintfMacros.cpp:551:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char mPun[16];
data/mozjs78-78.4.0/mfbt/tests/TestJSONWriter.cpp:20:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mBuf[kLen];
data/mozjs78-78.4.0/mfbt/tests/TestJSONWriter.cpp:435:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/mozjs78-78.4.0/mfbt/tests/TestSegmentedVector.cpp:260:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mBuf[101];
data/mozjs78-78.4.0/mfbt/tests/gtest/TestSpan.cpp:1165:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char arr[4] = {'a', 'b', 'c', 0};
data/mozjs78-78.4.0/modules/zlib/src/crc32.c:143:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        out = fopen("crc32.h", "w");
data/mozjs78-78.4.0/modules/zlib/src/gzguts.h:47:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define open _open
data/mozjs78-78.4.0/modules/zlib/src/gzlib.c:36:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[1024];
data/mozjs78-78.4.0/modules/zlib/src/gzlib.c:65:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "unknown win32 error (%ld)", error);
data/mozjs78-78.4.0/modules/zlib/src/gzlib.c:245:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        open((const char *)path, oflag, 0666));
data/mozjs78-78.4.0/modules/zlib/src/gzlib.c:298:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(path, "<fd:%d>", fd);   /* for debugging */
data/mozjs78-78.4.0/modules/zlib/src/gzlib.c:615:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(state->msg, ": ");
data/mozjs78-78.4.0/modules/zlib/src/gzread.c:161:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(state->x.next, strm->next_in, strm->avail_in);
data/mozjs78-78.4.0/modules/zlib/src/gzread.c:325:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, state->x.next, n);
data/mozjs78-78.4.0/modules/zlib/src/gzread.c:451:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[1];
data/mozjs78-78.4.0/modules/zlib/src/gzread.c:591:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, state->x.next, n);
data/mozjs78-78.4.0/modules/zlib/src/gzwrite.c:213:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(state->in + have, buf, copy);
data/mozjs78-78.4.0/modules/zlib/src/gzwrite.c:309:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[1];
data/mozjs78-78.4.0/modules/zlib/src/gzwrite.c:444:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(state->in, state->in + state->size, left);
data/mozjs78-78.4.0/modules/zlib/src/gzwrite.c:543:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(state->in, state->in + state->size, left);
data/mozjs78-78.4.0/modules/zlib/src/inflate.c:640:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hbuf[4];      /* buffer for gzip header crc calculation */
data/mozjs78-78.4.0/modules/zlib/src/inflate.c:1405:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4];       /* to restore bit buffer to byte string */
data/mozjs78-78.4.0/modules/zlib/src/trees.c:328:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *header = fopen("trees.h", "w");
data/mozjs78-78.4.0/modules/zlib/src/zutil.c:13:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
z_const char * const z_errmsg[10] = {
data/mozjs78-78.4.0/modules/zlib/src/zutil.h:49:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern z_const char * const z_errmsg[10]; /* indexed by 2-zlib_error */
data/mozjs78-78.4.0/modules/zlib/src/zutil.h:109:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     fopen((name), (mode), "mbc=60", "ctx=stm", "rfm=fix", "mrs=512")
data/mozjs78-78.4.0/modules/zlib/src/zutil.h:202:30:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define F_OPEN(name, mode) fopen((name), (mode))
data/mozjs78-78.4.0/modules/zlib/src/zutil.h:226:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#    define zmemcpy memcpy
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBuffer.cpp:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char chars[ProfileBufferEntry::kNumChars];
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBuffer.cpp:102:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(chars, &aStr[j], len);
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBufferEntry.cpp:33:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mStorage, &aString, sizeof(aString));
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBufferEntry.cpp:36:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ProfileBufferEntry::ProfileBufferEntry(Kind aKind, char aChars[kNumChars])
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBufferEntry.cpp:38:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mStorage, aChars, kNumChars);
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBufferEntry.cpp:42:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mStorage, &aPtr, sizeof(aPtr));
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBufferEntry.cpp:47:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mStorage, &aDouble, sizeof(aDouble));
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBufferEntry.cpp:51:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mStorage, &aInt, sizeof(aInt));
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBufferEntry.cpp:56:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mStorage, &aInt64, sizeof(aInt64));
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBufferEntry.cpp:61:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mStorage, &aUint64, sizeof(aUint64));
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBufferEntry.cpp:101:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(aOutArray, mStorage, kNumChars);
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBufferEntry.cpp:653:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char buf[BUF_SIZE];
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBufferEntry.cpp:706:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char chars[ProfileBufferEntry::kNumChars];
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBufferEntry.h:94:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  ProfileBufferEntry(Kind aKind, char aChars[kNumChars]);
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileJSONWriter.cpp:40:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mChunkPtr, aStr, aLen);
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileJSONWriter.cpp:68:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, mChunkList[i].get(), len);
data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.cpp:1544:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&stackImg.mContents[0], (void*)start, nToCopy);
data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.cpp:2827:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  stream.open(aFilename);
data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-linux.cc:182:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open(path, O_RDONLY, 0);
data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-linux.cc:601:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[3];
data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-linux.cc:616:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(identifier_swapped, &identifier[0],
data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-linux.cc:745:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char exeName[PATH_MAX];
data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-linux.cc:777:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[PATH_MAX];
data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-linux.cc:785:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char perm[6 + 1] = "";
data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-linux.cc:787:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char modulePath[PATH_MAX + 1] = "";
data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-macos.cc:146:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static constexpr char digits[16] = {'0', '1', '2', '3', '4', '5', '6', '7',
data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-win32.cc:28:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pdbFileName[1];
data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-win32.cc:31:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static constexpr char digits[16] = {'0', '1', '2', '3', '4', '5', '6', '7',
data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-win32.cc:168:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char modulePath[MAX_PATH + 1];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/AutoObjectMapper.cpp:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[300];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/AutoObjectMapper.cpp:69:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = open(fileName.c_str(), O_RDONLY);
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/AutoObjectMapper.cpp:106:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char version_string[PROP_VALUE_MAX] = {'\0'};
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulCommonExt.h:443:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char buf[40];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:1688:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[300];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:1696:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[300];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:1706:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[300];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:1715:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[300];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:1724:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[300];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:1734:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[300];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:1745:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[300];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:1756:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[300];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:1767:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[300];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:1777:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[300];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:1789:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[300];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:1801:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[300];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:1814:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[300];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:1828:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[300];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:1931:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:2080:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:2115:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[30];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:2128:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:2140:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:2153:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:2166:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:2219:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[300];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarf.cpp:2244:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[300];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarfSummariser.cpp:61:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarfSummariser.cpp:79:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulDwarfSummariser.cpp:521:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulElf.cpp:236:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int obj_fd = open(obj_file.c_str(), O_RDONLY);
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulElf.cpp:352:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[500];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulElf.cpp:457:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
string FormatIdentifier(unsigned char identifier[16]) {
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulElf.cpp:458:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char identifier_str[40];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulElf.cpp:490:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char identifier[16];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulElf.cpp:778:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(identifier, build_id,
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulElf.cpp:848:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(identifier_swapped, identifier, kMDGUIDSize);
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.cpp:109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[64];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.cpp:135:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[96];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.cpp:392:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[150];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.cpp:595:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.cpp:690:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];                                              \
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.cpp:728:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.cpp:765:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[200];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.cpp:810:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[200];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.cpp:830:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.cpp:1209:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[300];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.cpp:1322:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[100];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.cpp:1693:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&stackImg->mContents[0], (void*)start, nToCopy);
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.cpp:1782:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[200];
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.cpp:1815:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char space[FRAMESIZE];                                                    \
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.cpp:1916:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  volatile char space[LUL_UNIT_TEST_STACK_SIZE];
data/mozjs78-78.4.0/mozglue/baseprofiler/public/ModuloBuffer.h:403:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&mModuloBuffer->mBuffer[offset], aSrc, aLength);
data/mozjs78-78.4.0/mozglue/baseprofiler/public/ModuloBuffer.h:406:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&mModuloBuffer->mBuffer[offset], aSrc, remaining);
data/mozjs78-78.4.0/mozglue/baseprofiler/public/ModuloBuffer.h:408:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&mModuloBuffer->mBuffer[0],
data/mozjs78-78.4.0/mozglue/baseprofiler/public/ModuloBuffer.h:466:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(aDst, &mModuloBuffer->mBuffer[offset], aLength);
data/mozjs78-78.4.0/mozglue/baseprofiler/public/ModuloBuffer.h:469:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(aDst, &mModuloBuffer->mBuffer[offset], remaining);
data/mozjs78-78.4.0/mozglue/baseprofiler/public/ModuloBuffer.h:471:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(static_cast<Byte*>(aDst) + remaining, &mModuloBuffer->mBuffer[0],
data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferChunk.h:405:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ascii[columns + 1];
data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferEntrySerialization.h:213:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(aDest, mCurrentSpan.Elements(), aBytes);
data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferEntrySerialization.h:228:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(aDest, mCurrentSpan.Elements(), mCurrentSpan.LengthBytes());
data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferEntrySerialization.h:231:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(reinterpret_cast<Byte*>(aDest) + mCurrentSpan.LengthBytes(),
data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferEntrySerialization.h:451:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(mCurrentSpan.Elements(), aSrc, aBytes);
data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferEntrySerialization.h:462:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(mCurrentSpan.Elements(), aSrc, mCurrentSpan.LengthBytes());
data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferEntrySerialization.h:465:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(mNextSpanOrEmpty.Elements(),
data/mozjs78-78.4.0/mozglue/build/arm.cpp:38:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fin = fopen("/proc/cpuinfo", "r");
data/mozjs78-78.4.0/mozglue/build/arm.cpp:42:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[512];
data/mozjs78-78.4.0/mozglue/build/arm.cpp:55:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        version = atoi(buf + 17);
data/mozjs78-78.4.0/mozglue/build/mips.cpp:21:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fin = fopen("/proc/cpuinfo", "r");
data/mozjs78-78.4.0/mozglue/build/mips.cpp:23:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/mozglue/misc/Debug.h:39:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[2048];
data/mozjs78-78.4.0/mozglue/misc/NativeNt.h:265:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mBuf, aOther.mBuf, aOther.mSectionFileName.Length);
data/mozjs78-78.4.0/mozglue/misc/NativeNt.h:1262:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mzMagic[2];
data/mozjs78-78.4.0/mozglue/misc/Printf.cpp:225:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cvtbuf[100];
data/mozjs78-78.4.0/mozglue/misc/Printf.cpp:263:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cvtbuf[100];
data/mozjs78-78.4.0/mozglue/misc/Printf.cpp:290:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fin[20];
data/mozjs78-78.4.0/mozglue/misc/Printf.cpp:292:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fout[320];
data/mozjs78-78.4.0/mozglue/misc/Printf.cpp:300:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(fin, fmt0, (size_t)amount);
data/mozjs78-78.4.0/mozglue/misc/Printf.cpp:619:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pattern[20];
data/mozjs78-78.4.0/mozglue/misc/Printf.cpp:835:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&pattern[1], dolPt, size_t(i));
data/mozjs78-78.4.0/mozglue/misc/Printf.h:181:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(newbase, mBase, mMaxlen);
data/mozjs78-78.4.0/mozglue/misc/Printf.h:189:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mCur, sp, len);
data/mozjs78-78.4.0/mozglue/misc/StackWalk.h:86:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char library[256];
data/mozjs78-78.4.0/mozglue/misc/StackWalk.h:93:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[256];
data/mozjs78-78.4.0/mozglue/misc/StackWalk.h:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char function[256];
data/mozjs78-78.4.0/mozglue/misc/TimeStamp.h:48:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&here, this, sizeof(TimeStamp63Bit));
data/mozjs78-78.4.0/mozglue/misc/TimeStamp.h:49:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&there, &aOther, sizeof(TimeStamp63Bit));
data/mozjs78-78.4.0/mozglue/misc/TimeStamp_posix.cpp:199:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char stat[512];
data/mozjs78-78.4.0/mozglue/misc/TimeStamp_posix.cpp:201:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* f = fopen(aFile, "r");
data/mozjs78-78.4.0/mozglue/misc/TimeStamp_posix.cpp:251:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char threadStat[40];
data/mozjs78-78.4.0/mozglue/misc/TimeStamp_windows.cpp:410:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char cpuString[12];
data/mozjs78-78.4.0/mozglue/misc/decimal/moz-decimal-utils.h:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[64];
data/mozjs78-78.4.0/mozglue/misc/interceptor/MMPolicies.h:114:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    ::memcpy(aToPtr, aFromPtr, aLen);
data/mozjs78-78.4.0/mozglue/misc/interceptor/MMPolicies.h:119:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    ::memcpy(aToPtr, aFromPtr, aLen);
data/mozjs78-78.4.0/mozglue/misc/interceptor/PatcherNopSpace.h:105:11:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          wchar_t fname[_MAX_FNAME] = {0};
data/mozjs78-78.4.0/mozglue/misc/nsWindowsDllInterceptor.h:326:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t moduleName[N];
data/mozjs78-78.4.0/nsprpub/config/libc_r.h:40:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char r_strerror_r[R_MAX_STRERROR_LEN_R]
data/mozjs78-78.4.0/nsprpub/config/libc_r.h:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char r_asctime_r[26]
data/mozjs78-78.4.0/nsprpub/config/libc_r.h:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char r_ctime_r[26]
data/mozjs78-78.4.0/nsprpub/config/libc_r.h:91:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char r_getpwnam_line_r[R_MAX_PW_LEN_R]; \
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:136:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *linkprefix, *owner, *group, *cp, *cwd, *todir, *toname, *name, *base, *linkname, *bp, buf[BUFSIZ];
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:297:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            fromfd = open(name, O_RDONLY);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:304:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            tofd = open(toname, O_CREAT | O_WRONLY, 0666);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:498:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[NAME_MAX];
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:518:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(outpath + len, "../");
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:533:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[NAME_MAX];
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:555:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(cp, "../", 3);
data/mozjs78-78.4.0/nsprpub/lib/ds/plarena.c:171:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newp, p, size);
data/mozjs78-78.4.0/nsprpub/lib/libc/src/strdup.c:27:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void)memcpy(rv, s, n);
data/mozjs78-78.4.0/nsprpub/lib/libc/src/strdup.c:55:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void)memcpy(rv, s, l);
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:74:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
PRfilebuf *PRfilebuf::open(
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:363:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!_filebuf.open(name, flags | in, mode)) {
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:372:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
void PRifstream::open(const char *name, openmode flags, PRIntn mode)
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:374:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (is_open() || !_filebuf.open(name, flags | in, mode)) {
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:425:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!_filebuf.open(name, flags | out, mode)) {
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:434:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
void PRofstream::open(const char *name, openmode flags, PRIntn mode)
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:436:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (is_open() || !_filebuf.open(name, flags | out, mode)) {
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:487:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!_filebuf.open(name, flags | in | out, mode)) {
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:496:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
void PRfstream::open(const char *name, openmode flags, PRIntn mode)
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.cpp:498:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (is_open() || !_filebuf.open(name, flags | in | out, mode)) {
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.h:41:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    PRfilebuf *open(
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.h:95:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    void open(const char *name, openmode flags = in, PRIntn mode = 0);
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.h:120:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    void open(const char *name, openmode flags = out, PRIntn mode = 0);
data/mozjs78-78.4.0/nsprpub/lib/prstreams/prstrms.h:145:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    void open(const char *name, openmode flags = in | out, PRIntn mode = 0);
data/mozjs78-78.4.0/nsprpub/lib/prstreams/tests/testprstrm/testprstrm.cpp:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fname1[256];
data/mozjs78-78.4.0/nsprpub/lib/prstreams/tests/testprstrm/testprstrm.cpp:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fname2[256];
data/mozjs78-78.4.0/nsprpub/lib/prstreams/tests/testprstrm/testprstrm.cpp:124:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[1024];
data/mozjs78-78.4.0/nsprpub/lib/tests/arena.c:325:28:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                arenaMin = atol( opt->value );
data/mozjs78-78.4.0/nsprpub/lib/tests/arena.c:328:28:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                arenaMax = atol( opt->value );
data/mozjs78-78.4.0/nsprpub/lib/tests/arena.c:331:27:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                poolMin = atol( opt->value );
data/mozjs78-78.4.0/nsprpub/lib/tests/arena.c:334:27:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                poolMax = atol( opt->value );
data/mozjs78-78.4.0/nsprpub/lib/tests/arena.c:337:36:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                stressIterations = atol( opt->value );
data/mozjs78-78.4.0/nsprpub/lib/tests/arena.c:340:28:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                maxAlloc = atol( opt->value );
data/mozjs78-78.4.0/nsprpub/lib/tests/arena.c:343:33:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                stressThreads = atol( opt->value );
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:18:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char plain[ 4 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:19:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cypher[ 5 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:20:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[ 8 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:62:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char plain[ 4 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:63:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cypher[ 5 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[ 8 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:113:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char plain[ 4 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:114:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cypher[ 5 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:115:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[ 8 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2168:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[ 4096 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2201:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char plain[ 4 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2202:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cypher[ 5 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2247:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char plain[ 4 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2248:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cypher[ 5 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2300:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char plain[ 4 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2301:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cypher[ 5 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2391:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char plain[ 4 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2392:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cypher[ 5 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2393:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[ 8 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2435:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char plain[ 4 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2436:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cypher[ 5 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2437:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[ 8 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2479:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char plain[ 4 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2480:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cypher[ 5 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2481:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[ 8 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2530:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char plain[ 4 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2531:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cypher[ 5 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2532:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[ 8 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2581:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char plain[ 4 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2582:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cypher[ 5 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2583:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[ 8 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2638:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[ 4096 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2686:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[ 4096 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2687:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[ 4096 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2742:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char plain[ 4 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2743:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cypher[ 5 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2788:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char plain[ 4 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2789:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cypher[ 5 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2834:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char plain[ 4 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2835:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cypher[ 5 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2887:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char plain[ 4 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2888:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cypher[ 5 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2940:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char plain[ 4 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:2941:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cypher[ 5 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:3034:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[ 4096 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:3087:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[ 4096 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:3152:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[ 4096 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:3200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[ 4096 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:3201:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[ 4096 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/base64t.c:3290:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[ 4096 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/string.c:95:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buffer[ 1024 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/string.c:125:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        const char *b = (const char *)array[i].dest;
data/mozjs78-78.4.0/nsprpub/lib/tests/string.c:164:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buffer[ 1024 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/string.c:292:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buffer[ 1024 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/string.c:570:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[ 1024 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/string.c:684:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[ 1024 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/string.c:816:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[ 1024 ];
data/mozjs78-78.4.0/nsprpub/lib/tests/string.c:3035:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char string[ 1024 ];
data/mozjs78-78.4.0/nsprpub/pr/include/gencfg.c:152:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char c[4];
data/mozjs78-78.4.0/nsprpub/pr/include/gencfg.c:169:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char c[4];
data/mozjs78-78.4.0/nsprpub/pr/include/gencfg.c:199:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if(!(stream = fopen ( *argv, "wt" ))) {
data/mozjs78-78.4.0/nsprpub/pr/include/md/_unixos.h:584:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char st_fstype[_ST_FSTYPSZ];
data/mozjs78-78.4.0/nsprpub/pr/include/prio.h:148:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char data[14];                  /* raw address data */
data/mozjs78-78.4.0/nsprpub/pr/include/prio.h:154:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char pad[8];
data/mozjs78-78.4.0/nsprpub/pr/include/prio.h:167:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[108];                 /* null-terminated pathname */
data/mozjs78-78.4.0/nsprpub/pr/include/prio.h:170:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[104];                 /* null-terminated pathname */
data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/ranfile.cpp:168:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[30];
data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/ranfile.cpp:341:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                limit = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/ranfile.cpp:344:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                threads = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/ranfile.cpp:347:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                max_virtual_procs = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/switch.cpp:124:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                loop_limit = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/switch.cpp:127:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                thread_limit = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/src/cplus/tests/switch.cpp:130:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                concurrency = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prfdcach.c:209:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        _pr_fd_cache.limit_low = atoi(low);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prfdcach.c:212:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        _pr_fd_cache.limit_high = atoi(high);
data/mozjs78-78.4.0/nsprpub/pr/src/io/priometh.c:288:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(*raddr, &remote, PR_NETADDR_SIZE(&remote));
data/mozjs78-78.4.0/nsprpub/pr/src/io/pripv6.c:34:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char *) &dst_v4addr->inet.ip, srcp + 12, 4);
data/mozjs78-78.4.0/nsprpub/pr/src/io/pripv6.c:62:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dstp + 12,(char *) &src_v4addr->inet.ip, 4);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prlayer.c:669:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(
data/mozjs78-78.4.0/nsprpub/pr/src/io/prlog.c:74:15:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    int len = MultiByteToWideChar(CP_ACP, 0, msg, -1, 0, 0);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prlog.c:76:5:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    MultiByteToWideChar(CP_ACP, 0, msg, -1, wMsg, len);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prlog.c:193:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char module[64];  /* Security-Critical: If you change this
data/mozjs78-78.4.0/nsprpub/pr/src/io/prlog.c:318:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char module[64];  /* Security-Critical: If you change this
data/mozjs78-78.4.0/nsprpub/pr/src/io/prlog.c:387:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        newLogFile = fopen(file, mode);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prlog.c:445:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[LINE_BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/src/io/prlog.c:506:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char eol[2];
data/mozjs78-78.4.0/nsprpub/pr/src/io/prlog.c:529:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(logp, line, nb);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prpolevt.c:208:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/nsprpub/pr/src/io/prprf.c:232:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cvtbuf[100];
data/mozjs78-78.4.0/nsprpub/pr/src/io/prprf.c:272:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cvtbuf[100];
data/mozjs78-78.4.0/nsprpub/pr/src/io/prprf.c:319:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fin[20];
data/mozjs78-78.4.0/nsprpub/pr/src/io/prprf.c:320:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fout[300];
data/mozjs78-78.4.0/nsprpub/pr/src/io/prprf.c:327:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(fin, fmt0, amount);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prprf.c:712:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  pattern[20];
data/mozjs78-78.4.0/nsprpub/pr/src/io/prprf.c:951:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy( &pattern[1], dolPt, i );
data/mozjs78-78.4.0/nsprpub/pr/src/io/prscanf.c:196:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[FMAX + 1], *p;
data/mozjs78-78.4.0/nsprpub/pr/src/io/prscanf.c:306:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[FMAX + 1], *p;
data/mozjs78-78.4.0/nsprpub/pr/src/io/prsocket.c:150:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            iov_copy[0].iov_base = &(((char *)iov[index].iov_base)[tmp_out]);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prsocket.c:468:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&fd2->secret->md.peer_addr, addr, al);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prsocket.c:530:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&fd2->secret->md.peer_addr, addr, al);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prsocket.c:629:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, fd->secret->peekBuffer, rv);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prsocket.c:671:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(fd->secret->peekBuffer, buf, rv);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prsocket.c:1007:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&(*nd)->secret->md.peer_addr, *raddr,
data/mozjs78-78.4.0/nsprpub/pr/src/io/prsocket.c:1061:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(*nd)->secret->md.peer_addr, *raddr,
data/mozjs78-78.4.0/nsprpub/pr/src/io/prsocket.c:1116:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(*nd)->secret->md.peer_addr, *raddr,
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errStrBuf[ERR_STR_BUF_LENGTH];
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:494:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(newGlue, glue, sizeof(glue));
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:580:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathBuf[PATH_MAX];
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:639:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char utf8name_stack[MAX_PATH];
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:660:20:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        int wlen = MultiByteToWideChar(CP_ACP, 0, name, -1, NULL, 0);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:665:14:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
            !MultiByteToWideChar(CP_ACP, 0,  name, -1, wname, wlen)) {
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:1431:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    if (MultiByteToWideChar(CP_ACP, 0, name, -1, wname, MAX_PATH)) {
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:1458:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char module_name[_MAX_PATH];
data/mozjs78-78.4.0/nsprpub/pr/src/malloc/prmalloc.c:284:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/mozjs78-78.4.0/nsprpub/pr/src/malloc/prmalloc.c:302:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/mozjs78-78.4.0/nsprpub/pr/src/malloc/prmalloc.c:374:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(young, page_dir,
data/mozjs78-78.4.0/nsprpub/pr/src/malloc/prmalloc.c:918:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p,ptr,osize);
data/mozjs78-78.4.0/nsprpub/pr/src/malloc/prmalloc.c:921:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p,ptr,size);
data/mozjs78-78.4.0/nsprpub/pr/src/malloc/prmem.c:36:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char filler[48];  /* fix the size of this beast */
data/mozjs78-78.4.0/nsprpub/pr/src/malloc/prmem.c:160:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        use_zone_allocator = (atoi(envp) == 1);
data/mozjs78-78.4.0/nsprpub/pr/src/malloc/prmem.c:274:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(mt, mb, sizeof *mb);
data/mozjs78-78.4.0/nsprpub/pr/src/malloc/prmem.c:294:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mt, mb, sizeof *mb);
data/mozjs78-78.4.0/nsprpub/pr/src/malloc/prmem.c:381:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(rv, oldptr, mb->s.requestedSize);
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2inrval.c:26:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (atoi(envp) == 1) {
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c:159:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(copy, name, len);
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c:454:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[ CCHMAXPATH ];
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c:563:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[CCHMAXPATH];
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c:588:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char newfn[_MAX_PATH + 1];
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:231:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      pszEXEName[CCHMAXPATH] = "";
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:232:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      pszFormatString[CCHMAXPATH];
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:233:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      pszObjectBuffer[CCHMAXPATH];
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:239:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szFailed[CCHMAXPATH];
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:268:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(copy, path, len);
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:300:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                    strcpy(pszFormatString, "/C %s %s");
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:324:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(pszEXEName, "WINOS2.COM");
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:326:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(pszFormatString, "/3 %s %s");
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2rng.c:47:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, &low, nBytes);
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2rng.c:56:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(((char *)buf) + n, &high, nBytes);
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2rng.c:68:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(((char *)buf) + n, &val, nBytes);
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2rng.c:79:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(((char *)buf) + n, &sTime, nBytes);
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/aix.c:89:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (1 == atoi(evp)) {
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/hpux.c:88:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(newstack, oldstack, BACKTRACE_SIZE);
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/scoos.c:64:21:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    if ((_uw_semf = tmpfile()) == NULL) {
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:95:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _pr_md_pipebuf[PIPE_BUF];
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:2056:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (atoi(eval) == 0) {
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:2607:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
struct _MD_IOVector _md_iovector = { open };
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:2733:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        _md_iovector._open64 = open;
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:2740:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _md_iovector._open64 = open;
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:2751:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _md_iovector._open64 = open;
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:2766:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _md_iovector._open64 = open;
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:2869:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _pr_zero_fd = open("/dev/zero",O_RDWR, 0);
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unixware.c:67:21:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    if ((_uw_semf = tmpfile()) == NULL) {
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxproces.c:595:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxrng.c:77:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fdDevURandom = open( "/dev/urandom", O_RDONLY );
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxshm.c:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        ipcname[PR_IPC_NAME_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxshm.c:86:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        int osfd = open( shm->ipcname, (O_RDWR | O_CREAT), shm->mode );
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxshm.c:200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        ipcname[PR_IPC_NAME_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxshm.c:213:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        int osfd = open( ipcname, (O_RDWR | O_CREAT), 0666 );
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxshm.c:288:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        ipcname[PR_IPC_NAME_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxshm.c:428:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        ipcname[PR_IPC_NAME_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxshm.c:498:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        osfd = open(genName, (O_CREAT | O_EXCL | O_RDWR), mode);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c:1421:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char *)raddr, (char *)&Raddr->inet, *rlen);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c:2065:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(addr, &fd->secret->md.peer_addr, *len);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c:2826:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[ MAX_PATH ];
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c:2844:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(&filename[len], "\\*.*");
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c:2914:5:  [2] (buffer) CopyMemory:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    CopyMemory(prtm, filetime, sizeof(PRTime));
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c:2983:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char newfn[_MAX_PATH + 1];
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c:3607:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR lpBuffer[_PR_MAX_DRIVES*5];
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c:3707:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR szDrive[4] = TEXT("C:\\");
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntmisc.c:668:11:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    len = MultiByteToWideChar(CP_ACP, 0, cmdLine, -1, NULL, 0);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntmisc.c:670:5:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    MultiByteToWideChar(CP_ACP, 0, cmdLine, -1, wideCmdLine, len);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntmisc.c:671:11:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    len = MultiByteToWideChar(CP_ACP, 0, cwd, -1, NULL, 0);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntmisc.c:673:5:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    MultiByteToWideChar(CP_ACP, 0, cwd, -1, wideCwd, len);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntthread.c:315:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        if (MultiByteToWideChar(CP_ACP, 0, name, -1, wideName, MAX_PATH)) {
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w32ipcsem.c:22:5:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    MultiByteToWideChar(CP_ACP, 0, inName, -1, wideName, MAX_PATH);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w32ipcsem.c:148:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
            MultiByteToWideChar(CP_ACP, 0, osname, -1, wosname, MAX_PATH);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w32rng.c:43:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *)buf, &dwLow, nBytes);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w32rng.c:52:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(((char *)buf) + n, &dwHigh, nBytes);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w32rng.c:64:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(((char *)buf) + n, &dwVal, nBytes);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w32rng.c:75:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(((char *)buf) + n, &sTime, nBytes);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w32shm.c:37:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        ipcname[PR_IPC_NAME_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w32shm.c:97:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
            MultiByteToWideChar(CP_ACP, 0, shm->ipcname, -1,
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:474:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[ MAX_PATH ];
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:492:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(&filename[len], "\\*.*");
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:562:5:  [2] (buffer) CopyMemory:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    CopyMemory(prtm, filetime, sizeof(PRTime));
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:631:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char newfn[_MAX_PATH + 1];
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:1156:5:  [2] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
    wcscpy(&filename[len], L"\\*.*");
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95thred.c:242:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        if (MultiByteToWideChar(CP_ACP, 0, name, -1, wideName, MAX_PATH)) {
data/mozjs78-78.4.0/nsprpub/pr/src/misc/dtoa.c:614:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define Bcopy(x,y) memcpy((char *)&x->sign, (char *)&y->sign, \
data/mozjs78-78.4.0/nsprpub/pr/src/misc/dtoa.c:1538:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char hexdig[256];
data/mozjs78-78.4.0/nsprpub/pr/src/misc/pratom.c:88:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        ((num_atomic_locks = atoi(eval)) != DEFAULT_ATOMIC_LOCKS)) {
data/mozjs78-78.4.0/nsprpub/pr/src/misc/praton.c:77:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char index_hex[256] = {
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prcountr.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    name[PRCOUNTER_NAME_MAX+1];
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prcountr.c:68:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    name[PRCOUNTER_NAME_MAX+1];
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prcountr.c:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    desc[PRCOUNTER_DESC_MAX+1];
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prdtoa.c:615:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define Bcopy(x,y) memcpy((char *)&x->sign, (char *)&y->sign, \
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prdtoa.c:3606:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, result, resultlen);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prenv.c:156:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(*dst, *src, len);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prerror.c:58:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(thread->errorString, text, textLength+1 );
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prerror.c:73:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(text, thread->errorString, thread->errorStringLength+1);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prerrortable.c:65:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[6]; /* only used if internal code problems exist */
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prerrortable.c:93:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buffer[25];
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prerrortable.c:124:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (buffer, "Unknown code ");
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prinit.c:133:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        _native_threads_only = (atoi(envp) == 1);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/pripcsem.c:61:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char osname[PR_IPC_NAME_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/src/misc/pripcsem.c:90:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char osname[PR_IPC_NAME_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:196:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char addrstr[64];
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:202:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&addr.inet.ip, &sin->sin_addr, sizeof(sin->sin_addr));
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:206:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&addr.ipv6.ip, &sin6->sin6_addr, sizeof(sin6->sin6_addr));
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:325:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char addrstr[64];
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:475:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v6 + 12, v4, 4);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:484:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v6 + 12, v4, 4);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:526:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(to->h_name, from->h_name, len);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:550:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(to->h_aliases[na], *ap, len);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:578:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(to->h_addr_list[na], *ap, to->h_length);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:608:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(to->p_name, from->p_name, len);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:625:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(to->p_aliases[na], *ap, len);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:674:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localbuf[PR_NETDB_BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:819:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localbuf[PR_NETDB_BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:1027:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localbuf[PR_NETDB_BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:1448:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&address->ipv6.ip, addr, hostEnt->h_length);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:1454:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&address->inet.ip, addr, hostEnt->h_length);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:1590:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char index_hex[256] = {
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:1889:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dstp + 12,(char *) &v4addr, 4);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:2065:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      buf[PR_NETDB_BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:2230:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(result, ai->ai_addr, ai->ai_addrlen);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:2298:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&laddr, res->ai_addr, res->ai_addrlen);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prrng.c:26:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst, src, srclen);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prrng.c:30:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, (char*)src + (srclen - dstlen), dstlen);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prrng.c:32:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, src, dstlen);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prsystem.c:214:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAX_LINE];
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prsystem.c:219:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fin = fopen(cpu_present, "r");
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prsystem.c:232:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                        numCpus = 1 + atoi(buf + 2);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prsystem.c:343:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            bytes = (PRUint64) atoi(obj->value) * 1024;
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prtime.c:1923:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf, str, strSize);                   \
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prtime.c:1949:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          tmpBuf[ 40 ];
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prtrace.c:38:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    name[PRTRACE_NAME_MAX+1];
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prtrace.c:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    name[PRTRACE_NAME_MAX+1];
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prtrace.c:51:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    desc[PRTRACE_DESC_MAX+1];
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptio.c:378:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[100];
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptio.c:1057:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            hdtrl[0].iov_base = ((char *) hdtrl[0].iov_base) + count;
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptio.c:1085:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            hdtrl[1].iov_base =((char *) hdtrl[1].iov_base)+ trailer_nbytes_sent;
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptio.c:3647:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (uname(&u) != 0 || atoi(u.release) < 7) {
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptsynch.c:847:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char osname[PR_IPC_NAME_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptsynch.c:929:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char osname[PR_IPC_NAME_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptsynch.c:987:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char osname[PR_IPC_NAME_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptsynch.c:998:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        int osfd = open(osname, O_RDWR|O_CREAT, mode);
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptsynch.c:1125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char osname[PR_IPC_NAME_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptthread.c:1672:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(thread->name, name, nameLen + 1);
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptthread.c:1707:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name_dup[SETNAME_LENGTH_CONSTRAINT + 1];
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptthread.c:1709:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(name_dup, name, SETNAME_FRAGMENT1_LENGTH);
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptthread.c:1712:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(name_dup + SETNAME_FRAGMENT1_LENGTH + 1,
data/mozjs78-78.4.0/nsprpub/pr/src/threads/combined/pruthr.c:1648:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(thread->name, name, nameLen + 1);
data/mozjs78-78.4.0/nsprpub/pr/src/threads/prdump.c:24:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/mozjs78-78.4.0/nsprpub/pr/src/threads/prtpd.c:169:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void)memcpy(
data/mozjs78-78.4.0/nsprpub/pr/tests/abstract.c:25:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addr.local.path, abstractSocketName, sizeof(abstractSocketName));
data/mozjs78-78.4.0/nsprpub/pr/tests/abstract.c:78:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addr.local.path, abstractSocketName, sizeof(abstractSocketName));
data/mozjs78-78.4.0/nsprpub/pr/tests/accept.c:74:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char buf[4096 + 2*sizeof(PRNetAddr) + 32];
data/mozjs78-78.4.0/nsprpub/pr/tests/accept.c:119:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[CLIENT_DATA];
data/mozjs78-78.4.0/nsprpub/pr/tests/accept.c:466:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                count = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/acceptread.c:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[100];
data/mozjs78-78.4.0/nsprpub/pr/tests/acceptread.c:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/acceptread.c:183:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char netdb_buf[PR_NETDB_BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/acceptread.c:196:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        port_number = (PRUint16)atoi(argv[(argc == 2) ? 1 : 2]);
data/mozjs78-78.4.0/nsprpub/pr/tests/acceptreademu.c:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[100];
data/mozjs78-78.4.0/nsprpub/pr/tests/acceptreademu.c:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/acceptreademu.c:210:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char netdb_buf[PR_NETDB_BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/acceptreademu.c:226:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        port_number = (PRUint16)atoi(argv[(argc == 2) ? 1 : 2]);
data/mozjs78-78.4.0/nsprpub/pr/tests/addrstr.c:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/mozjs78-78.4.0/nsprpub/pr/tests/alarm.c:493:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                loops = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/alarm.c:496:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                cpus = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/anonfm.c:47:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    dirName[512] = "."; /* directory name to contain anon mapped file */
data/mozjs78-78.4.0/nsprpub/pr/tests/anonfm.c:146:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        fmString[256];
data/mozjs78-78.4.0/nsprpub/pr/tests/anonfm.c:147:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        envBuf[256];
data/mozjs78-78.4.0/nsprpub/pr/tests/anonfm.c:148:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        *child_argv[8];
data/mozjs78-78.4.0/nsprpub/pr/tests/anonfm.c:278:30:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    client = atol(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/anonfm.c:281:30:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    fmSize = atol( opt->value ) * 1024;
data/mozjs78-78.4.0/nsprpub/pr/tests/attach.c:146:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                count = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/bigfile.c:94:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ctime[40], mtime[40];
data/mozjs78-78.4.0/nsprpub/pr/tests/bigfile.c:154:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                count = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/bigfile.c:157:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                filesize = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/bigfile2.c:30:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MESSAGE_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/bigfile3.c:30:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MESSAGE_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/bug1test.c:218:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pad[512];      /* Work around bug in nspr on windoze */
data/mozjs78-78.4.0/nsprpub/pr/tests/cleanup.c:59:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                child_sleep = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/cleanup.c:62:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                main_sleep = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/cleanup.c:65:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                concurrency = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/cleanup.c:68:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                threads = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/cltsrv.c:159:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[60];  /* filename, null padded */
data/mozjs78-78.4.0/nsprpub/pr/tests/cltsrv.c:203:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[100];
data/mozjs78-78.4.0/nsprpub/pr/tests/cltsrv.c:218:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/cltsrv.c:398:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/cltsrv.c:1002:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                accepting = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/cltsrv.c:1005:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                backlog = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/cltsrv.c:1008:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                clients = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/cltsrv.c:1011:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                low = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/cltsrv.c:1014:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                high = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/cltsrv.c:1017:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                workersMin = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/cltsrv.c:1020:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                workersMax = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/cltsrv.c:1023:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                execution = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/cltsrv.c:1128:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[BUFFER_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/concur.c:82:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                range = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/concur.c:85:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                loops = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/cvar.c:269:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                count = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/cvar2.c:910:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                count = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/cvar2.c:913:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                default_threads = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/dbmalloc.c:39:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[4];
data/mozjs78-78.4.0/nsprpub/pr/tests/dbmalloc.c:52:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&rv->value[0], line, l+1);
data/mozjs78-78.4.0/nsprpub/pr/tests/dbmalloc.c:108:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[ BUFSIZ ];
data/mozjs78-78.4.0/nsprpub/pr/tests/dbmalloc.c:110:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(name, "r");
data/mozjs78-78.4.0/nsprpub/pr/tests/dbmalloc.c:262:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    nf = atoi(argv[0][2] ? &argv[0][2] :
data/mozjs78-78.4.0/nsprpub/pr/tests/dbmalloc.c:284:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            FILE *fp = fopen(*argv, "r");
data/mozjs78-78.4.0/nsprpub/pr/tests/dtoa.c:32:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char   cnvt[50];
data/mozjs78-78.4.0/nsprpub/pr/tests/errset.c:140:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char    msg[256];
data/mozjs78-78.4.0/nsprpub/pr/tests/exit.c:59:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                dally = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/fileio.c:123:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[BSIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/foreign.c:299:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                thread_cnt = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/forktest.c:115:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/mozjs78-78.4.0/nsprpub/pr/tests/formattm.c:14:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[256];
data/mozjs78-78.4.0/nsprpub/pr/tests/formattm.c:15:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char small_buffer[8];
data/mozjs78-78.4.0/nsprpub/pr/tests/fsync.c:54:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                filesize = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/fsync.c:57:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                iterations = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/getai.c:26:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[128];
data/mozjs78-78.4.0/nsprpub/pr/tests/gethost.c:61:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PR_NETDB_BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/gethost.c:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char reversebuf[PR_NETDB_BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/gethost.c:210:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[256];
data/mozjs78-78.4.0/nsprpub/pr/tests/gethost.c:222:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[256];
data/mozjs78-78.4.0/nsprpub/pr/tests/gethost.c:236:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[256];
data/mozjs78-78.4.0/nsprpub/pr/tests/gethost.c:249:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[256];
data/mozjs78-78.4.0/nsprpub/pr/tests/gethost.c:255:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp_buf[256];
data/mozjs78-78.4.0/nsprpub/pr/tests/getproto.c:28:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[2048];
data/mozjs78-78.4.0/nsprpub/pr/tests/i2l.c:55:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                si.i = (PRInt32)atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/i2l.c:59:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                ui.i = (PRUint32)atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/inrval.c:165:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                cpus = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/inrval.c:168:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                loops = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/instrumt.c:419:46:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                msgLevel = (PRLogModuleLevel)atol( opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/io_timeout.c:235:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                num_threads = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/io_timeoutk.c:206:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        num_threads = atoi(argv[2]);
data/mozjs78-78.4.0/nsprpub/pr/tests/io_timeoutu.c:207:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        num_threads = atoi(argv[2]);
data/mozjs78-78.4.0/nsprpub/pr/tests/ioconthr.c:20:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/ipv6.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[ADDR_BUFFER];
data/mozjs78-78.4.0/nsprpub/pr/tests/ipv6.c:140:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buffer[100];
data/mozjs78-78.4.0/nsprpub/pr/tests/ipv6.c:187:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[HOST_BUFFER];
data/mozjs78-78.4.0/nsprpub/pr/tests/ipv6.c:219:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[PROTO_BUFFER];
data/mozjs78-78.4.0/nsprpub/pr/tests/layer.c:316:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                major_iterations = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/layer.c:319:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                minor_iterations = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/layer.c:322:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                default_port = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/lazyinit.c:57:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        test = atoi(argv[1]);
data/mozjs78-78.4.0/nsprpub/pr/tests/libfilename.c:67:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(name, "libnspr4.dll");
data/mozjs78-78.4.0/nsprpub/pr/tests/lock.c:469:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    loops = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/lock.c:472:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    cpus = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/lockfile.c:213:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        loops = atoi(argv[1]);
data/mozjs78-78.4.0/nsprpub/pr/tests/lockfile.c:222:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    cpus = (argc < 3) ? 2 : atoi(argv[2]);
data/mozjs78-78.4.0/nsprpub/pr/tests/many_cv.c:57:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                cvs = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/many_cv.c:60:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                loops = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/mbcs.c:65:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    nextDir[256];
data/mozjs78-78.4.0/nsprpub/pr/tests/mbcs.c:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    file[256];
data/mozjs78-78.4.0/nsprpub/pr/tests/multiacc.c:65:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/multiwait.c:159:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buffer[100];
data/mozjs78-78.4.0/nsprpub/pr/tests/multiwait.c:753:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                client_threads = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/multiwait.c:756:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                ops_required = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/multiwait.c:759:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                default_port = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/multiwait.c:762:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                worker_threads = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/multiwait.c:765:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                wait_objects = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/nameshm1.c:113:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char        optName[NameSize] = OPT_NAME;
data/mozjs78-78.4.0/nsprpub/pr/tests/nameshm1.c:115:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char buf[1024] = "";
data/mozjs78-78.4.0/nsprpub/pr/tests/nameshm1.c:384:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *child_argv[8];
data/mozjs78-78.4.0/nsprpub/pr/tests/nameshm1.c:385:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[24];
data/mozjs78-78.4.0/nsprpub/pr/tests/nameshm1.c:428:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( (char*)addr, "FooBar" );
data/mozjs78-78.4.0/nsprpub/pr/tests/nameshm1.c:433:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( buf, "%d", optPing );
data/mozjs78-78.4.0/nsprpub/pr/tests/nameshm1.c:544:31:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    optSize = atol(opt->value) * 1024;
data/mozjs78-78.4.0/nsprpub/pr/tests/nameshm1.c:547:31:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    optPing = atol(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/nameshm1.c:550:43:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    optClientIterations = atol(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/nbconn.c:51:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/nbconn.c:192:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data_buf[DATA_BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/nbconn.c:242:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char send_buf[DATA_BUF_SIZE], recv_buf[DATA_BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/nblayer.c:632:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                major_iterations = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/nblayer.c:635:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                minor_iterations = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/nblayer.c:638:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                default_port = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/nonblock.c:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[CHUNK_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/nonblock.c:113:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[CHUNK_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/ntioto.c:108:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dataBuf[ACCEPT_READ_BUFSIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/ntioto.c:238:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    jitter = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/ntoh.c:18:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char bytes_n[8] = { 1, 2, 3, 4, 5, 6, 7, 8 };
data/mozjs78-78.4.0/nsprpub/pr/tests/ntoh.c:31:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char bytes[8];
data/mozjs78-78.4.0/nsprpub/pr/tests/op_2long.c:40:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char nameTooLong[TOO_LONG];
data/mozjs78-78.4.0/nsprpub/pr/tests/openfile.c:23:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[32];
data/mozjs78-78.4.0/nsprpub/pr/tests/openfile.c:29:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    template = fopen(TEMPLATE_FILE_NAME, "w");
data/mozjs78-78.4.0/nsprpub/pr/tests/peek.c:44:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[BUFFER_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/peek.c:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[BUFFER_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/perf.c:380:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                count = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/pipeping.c:44:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/pipeping.c:108:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(buf, "ping");
data/mozjs78-78.4.0/nsprpub/pr/tests/pipeping2.c:39:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/pipeping2.c:111:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(buf, "ping");
data/mozjs78-78.4.0/nsprpub/pr/tests/pipepong.c:30:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/pipepong.c:49:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(buf, "pong");
data/mozjs78-78.4.0/nsprpub/pr/tests/pipepong2.c:33:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/pipepong2.c:78:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(buf, "pong");
data/mozjs78-78.4.0/nsprpub/pr/tests/pipeself.c:32:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/pipeself.c:55:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(buf, "pong");
data/mozjs78-78.4.0/nsprpub/pr/tests/pipeself.c:81:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/pipeself.c:104:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(buf, "ping");
data/mozjs78-78.4.0/nsprpub/pr/tests/poll_er.c:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/mozjs78-78.4.0/nsprpub/pr/tests/poll_nm.c:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/mozjs78-78.4.0/nsprpub/pr/tests/poll_nm.c:84:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/mozjs78-78.4.0/nsprpub/pr/tests/poll_to.c:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/mozjs78-78.4.0/nsprpub/pr/tests/pollable.c:127:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                numIterations = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/pollable.c:130:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                numThreads = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/pollable.c:133:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                concurrency = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/pollable.c:139:51:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                dally = PR_MillisecondsToInterval(atoi(opt->value));
data/mozjs78-78.4.0/nsprpub/pr/tests/prftest.c:26:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/prftest.c:27:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char answer[BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/prftest.c:36:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(answer, "ffff ");
data/mozjs78-78.4.0/nsprpub/pr/tests/prftest.c:40:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(answer, " ffffffff ffffffffffffffff");
data/mozjs78-78.4.0/nsprpub/pr/tests/prftest1.c:67:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/prftest1.c:68:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char answer[BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/prftest1.c:104:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(answer, "ffff ");
data/mozjs78-78.4.0/nsprpub/pr/tests/prftest1.c:108:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(answer, " ffffffff ffffffffffffffff");
data/mozjs78-78.4.0/nsprpub/pr/tests/prftest2.c:44:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/prfz.c:18:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[128];
data/mozjs78-78.4.0/nsprpub/pr/tests/primblok.c:40:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[32];
data/mozjs78-78.4.0/nsprpub/pr/tests/priotest.c:148:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                duration = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/provider.c:159:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[60];  /* filename, null padded */
data/mozjs78-78.4.0/nsprpub/pr/tests/provider.c:203:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[100];
data/mozjs78-78.4.0/nsprpub/pr/tests/provider.c:218:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/provider.c:397:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/provider.c:1137:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                accepting = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/provider.c:1140:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                backlog = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/provider.c:1158:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                clients = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/provider.c:1161:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                workersMin = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/provider.c:1164:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                workersMax = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/provider.c:1167:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                execution = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/provider.c:1268:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[BUFFER_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/prpoll.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/prpoll.c:68:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/prselect.c:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/mozjs78-78.4.0/nsprpub/pr/tests/prselect.c:98:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/mozjs78-78.4.0/nsprpub/pr/tests/randseed.c:34:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    buf[40];
data/mozjs78-78.4.0/nsprpub/pr/tests/ranfile.c:127:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[30];
data/mozjs78-78.4.0/nsprpub/pr/tests/ranfile.c:302:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                limit = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/ranfile.c:305:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                threads = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/ranfile.c:308:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                loops = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/rwlocktest.c:69:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                thread_cnt = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/rwlocktest.c:72:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                loop_cnt = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/sel_spd.c:430:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                _iterations = atoi(optarg);
data/mozjs78-78.4.0/nsprpub/pr/tests/sel_spd.c:433:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                _threads_max = _threads = atoi(optarg);
data/mozjs78-78.4.0/nsprpub/pr/tests/sel_spd.c:436:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                _client_data = atoi(optarg);
data/mozjs78-78.4.0/nsprpub/pr/tests/sel_spd.c:439:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                _server_data = atoi(optarg);
data/mozjs78-78.4.0/nsprpub/pr/tests/selct_er.c:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/mozjs78-78.4.0/nsprpub/pr/tests/selct_nm.c:51:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/mozjs78-78.4.0/nsprpub/pr/tests/selct_nm.c:75:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/mozjs78-78.4.0/nsprpub/pr/tests/selct_to.c:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/mozjs78-78.4.0/nsprpub/pr/tests/select2.c:138:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[11];
data/mozjs78-78.4.0/nsprpub/pr/tests/select2.c:189:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(buf, "XXXXXXXXXX");
data/mozjs78-78.4.0/nsprpub/pr/tests/select2.c:242:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[11];
data/mozjs78-78.4.0/nsprpub/pr/tests/select2.c:299:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(buf, "XXXXXXXXXX");
data/mozjs78-78.4.0/nsprpub/pr/tests/select2.c:367:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        count = atoi(argv[2]);
data/mozjs78-78.4.0/nsprpub/pr/tests/sem.c:47:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char stdinBuf[SBSIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/sem.c:48:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char stdoutBuf[SBSIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/sem.c:116:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[BSIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/sema.c:85:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                iterations = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/semaerr.c:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *child_argv[32];
data/mozjs78-78.4.0/nsprpub/pr/tests/semaping.c:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *child_argv[32];
data/mozjs78-78.4.0/nsprpub/pr/tests/semaping.c:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char iterations_buf[32];
data/mozjs78-78.4.0/nsprpub/pr/tests/semaping.c:64:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                iterations = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/semapong.c:56:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                iterations = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/sendzlf.c:30:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/sendzlf.c:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char header[1024], trailer[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/sendzlf.c:95:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(header, HEADER_STR, HEADER_LEN);
data/mozjs78-78.4.0/nsprpub/pr/tests/sendzlf.c:96:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(trailer, TRAILER_STR, TRAILER_LEN);
data/mozjs78-78.4.0/nsprpub/pr/tests/socket.c:115:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    data[BUF_DATA_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/socket.c:1874:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char    data[TRANSMITFILE_BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/sockping.c:38:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/sockping.c:87:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(buf, "ping");
data/mozjs78-78.4.0/nsprpub/pr/tests/sockpong.c:33:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/sockpong.c:68:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(buf, "pong");
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:27:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char sbuf[20000];
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:37:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:88:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fmt[20];
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:121:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:186:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fmt[40], sfmt[40];
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:223:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:328:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fmt[40], sfmt[40];
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:365:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char before[8];
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:366:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:367:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char after[8];
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:424:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fmt[40];
data/mozjs78-78.4.0/nsprpub/pr/tests/stack.c:82:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                thread_cnt = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/stack.c:85:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                data_cnt = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/stack.c:88:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                loops = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/stat.c:78:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        count = atoi(argv[1]);
data/mozjs78-78.4.0/nsprpub/pr/tests/strod.c:43:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                loops = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/suspend.c:155:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        count = atoi(argv[1]);
data/mozjs78-78.4.0/nsprpub/pr/tests/switch.c:105:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                loop_limit = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/switch.c:108:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                thread_limit = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/switch.c:111:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                concurrency = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    data[BUF_DATA_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:79:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char pathname[256], renamename[256];
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:84:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char testdir[TMPDIR_LEN];
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:239:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpname[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:376:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(tmpname,".RENAMED");
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:670:5:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    MultiByteToWideChar(CP_ACP, 0, pathname, -1, wPathname, 256);
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:809:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(renamename, ".RENAMED");
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:939:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy((testdir + len),"prdir");
data/mozjs78-78.4.0/nsprpub/pr/tests/threads.c:155:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    count = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/threads.c:158:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    iterations = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/thrpool_client.c:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    data[BUF_DATA_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/thrpool_client.c:327:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                server_port = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/thrpool_server.c:65:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t wpath[MAX_PATH];
data/mozjs78-78.4.0/nsprpub/pr/tests/thrpool_server.c:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    data[BUF_DATA_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/thrpool_server.c:363:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *argv[MAX_ARGS + 1];
data/mozjs78-78.4.0/nsprpub/pr/tests/thrpool_server.c:365:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char port[32];
data/mozjs78-78.4.0/nsprpub/pr/tests/thrpool_server.c:366:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[1024 + sizeof("/thrpool_client")];
data/mozjs78-78.4.0/nsprpub/pr/tests/thrpool_server.c:370:15:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        (void)strcat(path, "/thrpool_client");
data/mozjs78-78.4.0/nsprpub/pr/tests/thrpool_server.c:372:15:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        (void)strcat(path, ".exe");
data/mozjs78-78.4.0/nsprpub/pr/tests/thrpool_server.c:375:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(port,"%d",PR_ntohs(netaddr.inet.port));
data/mozjs78-78.4.0/nsprpub/pr/tests/thruput.c:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[ADDR_BUFFER];
data/mozjs78-78.4.0/nsprpub/pr/tests/thruput.c:165:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[PR_NETDB_BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/thruput.c:346:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                initial_streams = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/thruput.c:349:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                concurrency = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/thruput.c:352:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                buffer_size = 1024 * atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/thruput.c:355:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                xport_buffer = 1024 * atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/time.c:159:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        count = atoi(argv[1]);
data/mozjs78-78.4.0/nsprpub/pr/tests/timetest.c:94:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char timeString[128];
data/mozjs78-78.4.0/nsprpub/pr/tests/timetest.c:95:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/mozjs78-78.4.0/nsprpub/pr/tests/timetest.c:115:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(timeString, "GMT ");  /* I wanted to use "UTC" here, but
data/mozjs78-78.4.0/nsprpub/pr/tests/tmoacc.c:224:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                backlog = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/tmoacc.c:227:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                threads = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/tmoacc.c:230:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                timeout = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/tmocon.c:47:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t wpath[MAX_PATH];
data/mozjs78-78.4.0/nsprpub/pr/tests/tmocon.c:111:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *argv[3];
data/mozjs78-78.4.0/nsprpub/pr/tests/tmocon.c:112:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[1024 + sizeof("/tmoacc")];
data/mozjs78-78.4.0/nsprpub/pr/tests/tmocon.c:116:15:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        (void)strcat(path, "/tmoacc");
data/mozjs78-78.4.0/nsprpub/pr/tests/tmocon.c:118:15:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        (void)strcat(path, ".exe");
data/mozjs78-78.4.0/nsprpub/pr/tests/tmocon.c:203:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[128];
data/mozjs78-78.4.0/nsprpub/pr/tests/tmocon.c:361:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buffer[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/tmocon.c:370:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                shared->messages = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/tmocon.c:373:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                threads = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/tmocon.c:376:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                dally = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/tmocon.c:379:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                timeout = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/tmocon.c:382:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                shared->message_length = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/udpsrv.c:98:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    mbuf[256];
data/mozjs78-78.4.0/nsprpub/pr/tests/udpsrv.c:123:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char     svrBuf[UDP_BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/udpsrv.c:238:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char         cltBuf[UDP_BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/udpsrv.c:239:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char         cltBufin[UDP_BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/pr/tests/udpsrv.c:354:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char   mbuf[256];
data/mozjs78-78.4.0/nsprpub/pr/tests/udpsrv.c:355:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( mbuf, "udpsrv: UDP_Client(): write_this_many: %d, numbytes: %d\n",
data/mozjs78-78.4.0/nsprpub/pr/tests/version.c:24:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[100];
data/mozjs78-78.4.0/nsprpub/pr/tests/writev.c:76:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buffer[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/writev.c:86:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                messages = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/writev.c:89:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                message_length = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/writev.c:92:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                fragment_length = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/y2k.c:228:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/y2ktmo.c:491:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                lead_time_secs = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/y2ktmo.c:494:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                tolerance_msecs = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/pr/tests/zerolen.c:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/nsprpub/pr/tests/zerolen.c:95:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/mozjs78-78.4.0/nsprpub/tools/httpget.c:42:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char inputBuf[INPUT_BUFFER_SIZE];
data/mozjs78-78.4.0/nsprpub/tools/httpget.c:124:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, inputHead, nBytes);
data/mozjs78-78.4.0/nsprpub/tools/httpget.c:131:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[FCOPY_BUFFER_SIZE];
data/mozjs78-78.4.0/nsprpub/tools/httpget.c:284:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PR_NETDB_BUF_SIZE];
data/mozjs78-78.4.0/nsprpub/tools/httpget.c:288:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char host[HOST_SIZE];
data/mozjs78-78.4.0/nsprpub/tools/httpget.c:289:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char port[PORT_SIZE];
data/mozjs78-78.4.0/nsprpub/tools/httpget.c:290:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[PATH_SIZE];
data/mozjs78-78.4.0/nsprpub/tools/httpget.c:291:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[LINE_SIZE];
data/mozjs78-78.4.0/nsprpub/tools/httpget.c:340:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    addr.inet.port = PR_htons((short) atoi(port));
data/mozjs78-78.4.0/nsprpub/tools/tail.c:38:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[BUFFER_SIZE];
data/mozjs78-78.4.0/nsprpub/tools/tail.c:58:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                seek = atoi(opt->value);
data/mozjs78-78.4.0/nsprpub/tools/tail.c:61:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                time = atoi(opt->value);
data/mozjs78-78.4.0/third_party/python/MarkupSafe/src/markupsafe/_speedups.c:137:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(outp, inp-ncopy, sizeof(*outp)*ncopy); \
data/mozjs78-78.4.0/third_party/python/MarkupSafe/src/markupsafe/_speedups.c:146:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(outp, inp-ncopy, sizeof(*outp)*ncopy); \
data/mozjs78-78.4.0/third_party/python/MarkupSafe/src/markupsafe/_speedups.c:155:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(outp, inp-ncopy, sizeof(*outp)*ncopy); \
data/mozjs78-78.4.0/third_party/python/MarkupSafe/src/markupsafe/_speedups.c:164:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(outp, inp-ncopy, sizeof(*outp)*ncopy); \
data/mozjs78-78.4.0/third_party/python/MarkupSafe/src/markupsafe/_speedups.c:172:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(outp, inp-ncopy, sizeof(*outp)*ncopy); \
data/mozjs78-78.4.0/third_party/python/MarkupSafe/src/markupsafe/_speedups.c:184:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(outp, inp-ncopy, sizeof(*outp)*ncopy); \
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_aix.c:69:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(path, O_RDONLY);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_aix.c:97:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[100];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_aix.c:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[100];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_aix.c:392:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[100];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_aix.c:416:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[100];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_bsd.c:192:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[1000];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_bsd.c:361:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[1000];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_bsd.c:539:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char opts[200];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_bsd.c:741:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char ifc_name[32];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_bsd.c:809:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(_PATH_UTMP, "r");
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_common.c:74:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fullmsg[1024];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_common.c:97:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[1024];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_common.c:114:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[1024];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_common.c:239:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fullmsg[1024];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_osx.c:292:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PATH_MAX];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_osx.c:738:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char opts[400];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_osx.c:1148:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char lip[200], rip[200];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_osx.c:1352:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char ifc_name[32];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_osx.c:1465:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char disk_name[kMaxDiskNameSize];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_posix.c:172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[NI_MAXHOST];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_posix.c:229:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(ptr, "%02x:", data[n] & 0xff);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:70:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(path, O_RDONLY);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:99:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[1000];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:167:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(last, array[i], item_length);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:185:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[1000];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:256:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[1000];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:331:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[1000];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:358:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[1000];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:371:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(path, O_RDONLY);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:430:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[1000];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:451:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[1000];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:508:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[1000];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:698:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    file = fopen(MNTTAB, "rb");
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:855:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[1000];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:856:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char perms[10];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:890:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(path, O_RDONLY);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:917:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(perms, "%c%c%c%c", p->pr_mflags & MA_READ ? 'r' : '-',
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:1125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[512];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:1127:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lip[INET6_ADDRSTRLEN], rip[INET6_ADDRSTRLEN];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:1147:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    sd = open("/dev/arp", O_RDWR);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:1180:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, &tor, sizeof tor);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:1181:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf + tor.OPT_offset, &mibhdr, sizeof mibhdr);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:1196:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&toa, buf, sizeof toa);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:1197:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&tea, buf, sizeof tea);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:1222:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&mibhdr, buf + toa.OPT_offset, toa.OPT_length);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:1244:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&tp, databuf.buf + i * sizeof tp, sizeof tp);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:1289:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&tp6, databuf.buf + i * sizeof tp6, sizeof tp6);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:1331:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&ude, databuf.buf + i * sizeof ude, sizeof ude);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:1371:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&ude6, databuf.buf + i * sizeof ude6, sizeof ude6);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_windows.c:1197:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char address_str[50];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/ifaddrs.c:35:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sa2, sa1, sz);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/net_connections.c:84:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char laddr_str[INET6_ADDRSTRLEN];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/net_connections.c:85:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char raddr_str[INET6_ADDRSTRLEN];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/net_connections.c:87:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char unix_laddr_str[PATH_MAX] = { 0 };
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/net_connections.c:88:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char unix_raddr_str[PATH_MAX] = { 0 };
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/net_connections.c:226:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    Kd = open(KMEM, O_RDONLY, 0);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/proc_socks.c:230:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char lip[200], rip[200];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/proc_socks.c:231:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[PATH_MAX];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.c:234:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathname[PATH_MAX];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.c:692:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char disk_name[128];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.c:736:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char addr[1000];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.c:737:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char perms[4];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.c:765:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(addr, "%#*jx-%#*jx", ptrwidth, (uintmax_t)kve->kve_start,
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.c:1016:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sensor[26];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.c:1021:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sensor, "dev.cpu.%d.temperature", core);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.c:1027:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sensor, "dev.cpu.%d.coretemp.tjmax", core);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.c:1052:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sensor[26];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.c:1053:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char available_freq_levels[1000];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.c:1059:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sensor, "dev.cpu.%d.freq", core);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.c:1066:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sensor, "dev.cpu.%d.freq_levels", core);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/sys_socks.c:176:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char lip[200], rip[200];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/sys_socks.c:244:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[PATH_MAX];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/netbsd/socks.c:313:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char laddr[PATH_MAX];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/netbsd/socks.c:314:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char raddr[PATH_MAX];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/netbsd/specific.c:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[MAXPATHLEN];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/netbsd/specific.c:313:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errbuf[_POSIX2_LINE_MAX];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/netbsd/specific.c:346:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*procList, result, mlen);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/openbsd/specific.c:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fullmsg[8192];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/openbsd/specific.c:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errbuf[_POSIX2_LINE_MAX];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/openbsd/specific.c:173:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*procList, result, mlen);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/openbsd/specific.c:247:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errbuf[4096];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/openbsd/specific.c:433:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[MAXPATHLEN];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/openbsd/specific.c:452:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/openbsd/specific.c:464:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char hbuf[NI_MAXHOST];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/openbsd/specific.c:529:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char addrbuf[NI_MAXHOST + 2];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/osx/process_info.c:306:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(procenv + (arg_ptr - env_start), arg_ptr, s - arg_ptr);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/solaris/environ.c:38:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char proc_path[PATH_MAX];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/solaris/environ.c:41:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(proc_path, O_RDONLY);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/solaris/environ.c:96:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[STRING_SEARCH_BUF_SIZE];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/solaris/environ.c:251:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[8];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/solaris/environ.c:252:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char zeros[8] = { 0, 0, 0, 0, 0, 0, 0, 0 };
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/solaris/v10/ifaddrs.c:29:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sa2,sa1,sz);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/disk.c:87:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szDevice[MAX_PATH];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/disk.c:88:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szDeviceDisplay[MAX_PATH];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/disk.c:196:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char drive_strings[255];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/disk.c:198:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mp_buf[MAX_PATH];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/disk.c:199:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mp_path[MAX_PATH];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/disk.c:204:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char opts[20];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/disk.c:356:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR szBuff[5];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/disk.c:362:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR szDeviceName[3] = {d, TEXT(':'), TEXT('\0')};
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/disk.c:363:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR szTarget[512] = {0};
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/net.c:148:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff_addr[1024];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/net.c:149:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff_macaddr[1024];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/net.c:150:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff_netmask[1024];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/net.c:338:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char descr[MAX_PATH];
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/socks.c:282:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&addr, tcp6Table->table[i].ucLocalAddr, 16);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/socks.c:305:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&addr, tcp6Table->table[i].ucRemoteAddr, 16);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/socks.c:425:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&addr, udp6Table->table[i].ucLocalAddr, 16);
data/mozjs78-78.4.0/third_party/python/pyrsistent/pvectorcmodule.c:120:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(result->items, source->items, sizeof(source->items));
data/mozjs78-78.4.0/third_party/python/pyrsistent/pvectorcmodule.c:563:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest, src, BRANCH_FACTOR * sizeof(void*));
data/mozjs78-78.4.0/third_party/python/pyrsistent/pvectorcmodule.c:758:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(newVec->tail->items, original->tail->items, TAIL_SIZE(original) * sizeof(void*));
data/mozjs78-78.4.0/third_party/python/pyyaml/ext/_yaml.c:687:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ascii_chars[128];
data/mozjs78-78.4.0/third_party/python/pyyaml/ext/_yaml.c:14951:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(__pyx_v_buffer, (PyString_AS_STRING(__pyx_t_1) + __pyx_v_parser->stream_cache_pos), __pyx_v_size);
data/mozjs78-78.4.0/third_party/python/pyyaml/ext/_yaml.c:28949:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ctversion[4], rtversion[4];
data/mozjs78-78.4.0/third_party/python/pyyaml/ext/_yaml.c:28953:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char message[200];
data/mozjs78-78.4.0/third_party/python/scandir/_scandir.c:236:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char target_buffer[MAXIMUM_REPARSE_DATA_BUFFER_SIZE];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-port.h:1621:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return fopen(path, mode);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-string.h:304:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(str, buffer, a_length);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample2.cc:44:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(clone, a_c_string, len + 1);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-death-test.cc:274:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[256];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-death-test.cc:693:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char executable_path[_MAX_PATH + 1];  // NOLINT
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-filepath.cc:106:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cwd[GTEST_PATH_MAX_ + 1] = { '\0' };
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-filepath.cc:109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cwd[GTEST_PATH_MAX_ + 1] = { '\0' };
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-port.cc:416:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, regex, len);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-port.cc:494:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp_dir_path[MAX_PATH + 1] = { '\0' };  // NOLINT
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-port.cc:495:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp_file_path[MAX_PATH + 1] = { '\0' };  // NOLINT
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-port.cc:513:29:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
    const int captured_fd = mkstemp(name_template);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-printers.cc:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char text[5] = "";
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:863:7:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
      MultiByteToWideChar(CP_ACP, 0, ansi, length,
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:866:3:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  MultiByteToWideChar(CP_ACP, 0, ansi, length,
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:1354:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error_text[kBufSize] = { '\0' };
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:1522:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];  // CodePointToUtf8 requires a buffer this big.
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:1704:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[4096];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-filepath_test.cc:384:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char current_drive[_MAX_PATH];  // NOLINT
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-filepath_test.cc:401:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char non_drive[_MAX_PATH];  // NOLINT
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-printers_test.cc:127:32:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  UnprintableInFoo() : z_(0) { memcpy(xy_, "\xEF\x12\x0\x0\x34\xAB\x0\x0", 8); }
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-printers_test.cc:129:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char xy_[8];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-printers_test.cc:618:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char a[3] = { 'H', '\0', 'i' };
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-printers_test.cc:624:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char a[4] = "\0Hi";
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-printers_test.cc:1039:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char array[257];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:356:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[32];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:362:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[32];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:372:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[32];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:387:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[32];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:405:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[32];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:418:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[32];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:1177:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[4096];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:7223:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char a[3] = "hi";
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest_unittest.cc:7307:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char a[2][3] = { "hi", "lo" };
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/xcode/Samples/FrameworkSample/widget_test.cc:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[max_size];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb.c:505:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char devfmts[128] = "";
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb.c:555:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(devfmts, " S16LE");
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb.c:558:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(devfmts, " S16BE");
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb.c:561:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(devfmts, " F32LE");
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb.c:564:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(devfmts, " F32BE");
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_alsa.c:269:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&ctx->fds[j], stm->saved_fds, stm->nfds * sizeof(struct pollfd));
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_alsa.c:585:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char node_name[64];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_alsa.c:645:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char node_name[64];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_jack.cpp:166:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char stream_name[256];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_jack.cpp:577:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(stream->context->in_resampled_interleaved_buffer_float, in_buffer, (FIFO_SIZE * MAX_CHANNELS * 2) * sizeof(float));
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_jack.cpp:870:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char portname[256];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_jack.cpp:882:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char portname[256];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_log.cpp:41:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  cubeb_log_message(char const str[CUBEB_LOG_MESSAGE_MAX_SIZE])
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_log.cpp:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char storage[CUBEB_LOG_MESSAGE_MAX_SIZE];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_log.cpp:69:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  void push(char const str[CUBEB_LOG_MESSAGE_MAX_SIZE])
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_log.cpp:132:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg[CUBEB_LOG_MESSAGE_MAX_SIZE];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_opensl.c:639:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char version_string[PROP_VALUE_MAX];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_pulse.c:173:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ctx->default_sink_info->channel_map, &info->channel_map, sizeof(pa_channel_map));
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_strings.c:20:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char * small_store[CUBEB_STRINGS_INLINE_COUNT];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_strings.c:118:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(new_data, strings->small_store, sizeof(strings->small_store));
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_sun.c:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[32];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_sun.c:153:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fd = open(device, O_RDONLY)) == -1) {
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_sun.c:195:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dev[16] = SUN_DEFAULT_DEVICE;
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_sun.c:196:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dev_friendly[64];
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_sun.c:550:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((s->record.fd = open(s->record.name, O_RDONLY)) == -1) {
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_sun.c:574:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((s->play.fd = open(s->play.name, O_WRONLY)) == -1) {
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_utils.h:32:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(destination, source, count * sizeof(T));
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_wasapi.cpp:2698:16:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  int size = ::MultiByteToWideChar(CP_UTF8, 0, str, -1, nullptr, 0);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_wasapi.cpp:2704:5:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  ::MultiByteToWideChar(CP_UTF8, 0, str, -1, ret.get(), size);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_devices.cpp:35:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char devfmts[64] = "";
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_devices.cpp:85:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(devfmts, " S16LE");
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_devices.cpp:87:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(devfmts, " S16BE");
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_devices.cpp:89:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(devfmts, " F32LE");
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_devices.cpp:91:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(devfmts, " F32BE");
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_resampler.cpp:76:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  *f = fopen(name, mode);
data/mozjs78-78.4.0/third_party/rust/encoding_c/include/encoding_rs_cpp.h:1106:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      std::memcpy(&vec[0], string.data(), string.size());
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/contrib/glslopt/Main.cpp:37:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE* file = fopen(filename, "rt");
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/contrib/glslopt/Main.cpp:60:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE* file = fopen(filename, "wt");
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/include/c11/threads_win32.h:146:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pack, p, sizeof(struct impl_thrd_param));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2472:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[4] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2479:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[8] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2487:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[8] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2494:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[8] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2503:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[4] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2510:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[4] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2516:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[8] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2524:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[4] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2537:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[4] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2543:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[8] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2550:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[8] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2557:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[8] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2565:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[4] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2572:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[4] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2578:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[8] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2592:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[4] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2598:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[8] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2605:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[8] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2612:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[8] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2620:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[4] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2627:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[4] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:2633:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static const char *const names[8] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_variables.cpp:629:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	 memcpy(slots->tokens, element->tokens, sizeof(element->tokens));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp-lex.c:958:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(yylval->str, yytext, yyleng + 1);        \
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp-parse.c:1356:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char const *yyarg[YYERROR_VERBOSE_ARGS_MAXIMUM];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp-parse.c:1569:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char yymsgbuf[128];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp.c:86:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen (filename, "r");
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/pp.c:117:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char newline_separator[3];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_lexer.cpp:2059:36:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                                   memcpy(yylloc->path, ptr, path_len);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_lexer.cpp:2189:37:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                                    memcpy(id, yytext, yyleng + 1);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_lexer.cpp:4723:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(id, name, name_len + 1);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_parser.cpp:2004:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char const *yyarg[YYERROR_VERBOSE_ARGS_MAXIMUM];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_parser.cpp:2217:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char yymsgbuf[128];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_parser.cpp:4242:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      static const char * const local_size_qualifiers[3] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_parser_extras.cpp:2121:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char buf[41];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_parser_extras.cpp:2257:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char sha1_buf[41];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir.cpp:1665:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static const unsigned char base_idx[26] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir.cpp:1689:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static const unsigned char idx_map[26] = {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir.h:648:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char name_storage[16];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir.h:1524:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char *const ir_expression_operation_strings[ir_last_opcode + 1];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir.h:1525:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char *const ir_expression_operation_enum_strings[ir_last_opcode + 1];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_builder_print_visitor.cpp:443:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      static const char swiz[4] = { 'x', 'y', 'z', 'w' };
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_builder_print_visitor.cpp:456:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      static const char swiz[4] = { 'X', 'Y', 'Z', 'W' };
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_builder_print_visitor.cpp:716:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char return_deref_string[32];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_builder_print_visitor.cpp:724:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(return_deref_string, "NULL");
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_clone.cpp:50:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(var->u.max_ifc_array_access, this->u.max_ifc_array_access,
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_clone.cpp:58:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(s, this->get_state_slots(),
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_constant_expression.cpp:89:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&u, &f, sizeof(f));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_constant_expression.cpp:119:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&u, &d, sizeof(d));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_constant_expression.cpp:129:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&i, &d, sizeof(d));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_operation_constant.h:1078:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&data.d[0], &op[0]->value.u[0], sizeof(double));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_operation_constant.h:1082:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&data.u[0], &op[0]->value.d[0], sizeof(double));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_operation_constant.h:1086:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&data.u64[0], &op[0]->value.u[0], sizeof(uint64_t));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_operation_constant.h:1090:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&data.u64[0], &op[0]->value.u[0], sizeof(uint64_t));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_operation_constant.h:1094:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&data.u[0], &op[0]->value.u64[0], sizeof(uint64_t));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_operation_constant.h:1098:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&data.u[0], &op[0]->value.u64[0], sizeof(uint64_t));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_operation_constant.h:1102:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&data.i64[0], &op[0]->value.i[0], sizeof(int64_t));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_operation_constant.h:1106:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&data.u64[0], &op[0]->value.u[0], sizeof(uint64_t));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_operation_constant.h:1110:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&data.i[0], &op[0]->value.i64[0], sizeof(int64_t));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_expression_operation_constant.h:1114:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&data.u[0], &op[0]->value.u64[0], sizeof(uint64_t));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_glsl_visitor.cpp:172:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char *precStrings[3] = {"lowp", "mediump", "highp"};
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_glsl_visitor.cpp:173:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char *precNameStrings[3] = { "low_", "medium_", "high_" };
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_glsl_visitor.cpp:477:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *const mode[3][ir_var_mode_count] =
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_glsl_visitor.cpp:1244:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mask[5];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_glsl_visitor.cpp:1435:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[64];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_glsl_visitor.cpp:1446:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(tmp, "(1.0/0.0)");
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_glsl_visitor.cpp:1449:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(tmp, "(-1.0/0.0)");
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_glsl_visitor.cpp:1453:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(tmp, "(0.0/0.0)");
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_visitor.cpp:168:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char binding[32] = {0};
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_visitor.cpp:172:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char loc[32] = {0};
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_visitor.cpp:176:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char component[32] = {0};
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_visitor.cpp:181:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char stream[32] = {0};
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_visitor.cpp:192:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char image_format[32] = {0};
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_print_visitor.cpp:442:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mask[5];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_interface_blocks.cpp:241:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char location_str[11];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_interface_blocks.cpp:267:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char location_str[11];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniform_blocks.cpp:548:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(linked_block, new_block, sizeof(*new_block));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniform_blocks.cpp:553:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(linked_block->Uniforms,
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniform_initializers.cpp:70:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&storage[i * 2].u, &val->value.d[i], sizeof(double));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniform_initializers.cpp:308:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(prog->data->UniformDataDefaults, prog->data->UniformDataSlots,
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/linker.cpp:1646:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(fields, type->fields.structure,
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/linker.cpp:1678:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(fields, ifc_type->fields.structure,
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_packed_varyings.cpp:562:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char left_swizzle_name[4] = { 0, 0, 0, 0 };
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_packed_varyings.cpp:563:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char right_swizzle_name[4] = { 0, 0, 0, 0 };
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_shared_reference.cpp:414:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char func_name[64];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_ubo_reference.cpp:1041:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char func_name[64];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_dead_builtin_varyings.cpp:322:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char name[32];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_dead_builtin_varyings.cpp:343:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char name[32];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_dead_builtin_varyings.cpp:364:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char name[32];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/serialize.cpp:563:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(prog->data->UniformDataDefaults, prog->data->UniformDataSlots,
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/shader_cache.cpp:97:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static const char zero[sizeof(prog->data->sha1)] = {0};
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/shader_cache.cpp:124:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(cache_item_metadata.keys[i], prog->Shaders[i]->sha1,
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/shader_cache.cpp:131:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sha1_buf[41];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/shader_cache.cpp:198:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sha1buf[41];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/standalone.cpp:355:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   FILE *fp = fopen(file_name, "rb");
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/standalone_scaffolding.cpp:127:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/standalone_scaffolding.cpp:275:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&ctx->Const.ShaderCompilerOptions[sh], &options, sizeof(options));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/standalone_scaffolding.h:78:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern "C" char *
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl_types.cpp:636:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char name[128];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl_types.cpp:1002:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char key[128];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/imports.c:204:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(newBuf, oldBuffer, copySize);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/mtypes.h:2602:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char sha1[20]; /**< SHA1 hash of pre-processed source */
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/mtypes.h:2890:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char sha1[20];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/main/mtypes.h:4429:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   const char *unrecognized_extensions[MAX_UNRECOGNIZED_EXTENSIONS];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/program/prog_parameter.h:160:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    gl_register_file type, const char *name,
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/mesa/program/prog_statevars.h:147:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char *
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/bitset.h:51:27:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define BITSET_COPY(x, y) memcpy( (x), (y), sizeof (x) )
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/blob.c:152:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(blob->data + offset, bytes, to_write);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/blob.c:166:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(blob->data + blob->size, bytes, to_write);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/blob.c:292:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dest, bytes, size);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:195:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(_dst, _src, _src_size);          \
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:306:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(path, O_RDWR | O_CREAT | O_CLOEXEC, 0644);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:472:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[41];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:495:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[41];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:545:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(lru_name, entry->d_name, len + 1);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:848:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dc_job->key, key, sizeof(cache_key));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:850:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dc_job->data, data, size);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:865:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dc_job->cache_item_metadata.keys,
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:927:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(filename_tmp, O_WRONLY | O_CLOEXEC | O_CREAT, 0644);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:936:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fd = open(filename_tmp, O_WRONLY | O_CLOEXEC | O_CREAT, 0644);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:966:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd_final = open(filename, O_RDONLY | O_CLOEXEC);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:1173:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd = open(filename, O_RDONLY | O_CLOEXEC);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:1294:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(entry, key, CACHE_KEY_SIZE);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/hash_table.c:183:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ht, src, sizeof(struct hash_table));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/hash_table.c:191:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ht->table, src->table, ht->size * sizeof(struct hash_entry));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/mesa-sha1.c:31:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
_mesa_sha1_compute(const void *data, size_t size, unsigned char result[20])
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/mesa-sha1.h:49:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
_mesa_sha1_final(struct mesa_sha1 *ctx, unsigned char result[20])
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/mesa-sha1.h:58:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
_mesa_sha1_compute(const void *data, size_t size, unsigned char result[20]);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/mesa-sha1_test.c:48:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char sha1[20];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/mesa-sha1_test.c:52:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[41];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:377:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ptr, str, n);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:393:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ptr, str, n);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:411:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(both + existing_length, str, n);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:442:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(both + existing_length, str, str_size);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:783:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(new_ptr, old, MIN2(old_size, new_size));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:806:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ptr, str, n);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:906:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(both + existing_length, str, n);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/set.c:160:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(clone, set, sizeof(struct set));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/set.c:168:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(clone->table, set->table, clone->size * sizeof(struct set_entry));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/sha1/sha1.c:61:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void)memcpy(block, buffer, SHA1_BLOCK_LENGTH);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/sha1/sha1.c:132:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		(void)memcpy(&context->buffer[j], data, (i = 64-j));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/sha1/sha1.c:140:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void)memcpy(&context->buffer[j], &data[i], len - i);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/string_buffer.c:101:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(str->buf + str->length, c, len);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/strndup.h:50:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ptr, str, n);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_dynarray.h:126:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buf->data, from_buf->data, from_buf->size);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_dynarray.h:171:64:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define util_dynarray_append(buf, type, v) do {type __v = (v); memcpy(util_dynarray_grow_bytes((buf), 1, sizeof(type)), &__v, sizeof(type));} while(0)
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_dynarray.h:202:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(util_dynarray_element((buf), type, (i)),             \
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/u_math.h:641:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   return memcpy(dest, src, n);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/xxhash.h:251:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef struct { unsigned char digest[4]; } XXH32_canonical_t;
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/xxhash.h:288:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef struct { unsigned char digest[8]; } XXH64_canonical_t;
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/xxhash.h:436:76:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
static void* XXH_memcpy(void* dest, const void* src, size_t size) { return memcpy(dest,src,size); }
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/xxhash.h:840:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dstState, srcState, sizeof(*dstState));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/xxhash.h:852:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(statePtr, &state, sizeof(state) - sizeof(state.reserved));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/xxhash.h:952:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, &hash, sizeof(*dst));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/xxhash.h:1301:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dstState, srcState, sizeof(*dstState));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/xxhash.h:1313:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(statePtr, &state, sizeof(state) - sizeof(state.reserved64));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/xxhash.h:1409:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, &hash, sizeof(*dst));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:10465:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char hidden[48];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:14026:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
# define memcpy(D,S,N) {char*xxd=(char*)(D);const char*xxs=(const char*)(S);\
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:18492:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  typedef unsigned char yDbMask[(SQLITE_MAX_ATTACHED+9)/8];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:20279:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
SQLITE_PRIVATE const unsigned char sqlite3CtypeMap[256] = {
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:20900:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char z[8];               /* Dequoted value for the string */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:22468:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[100];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:22488:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[100];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:22507:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[100];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:22544:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:22731:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[20];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:23044:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zBufOut, &sqlite3Config.iPrngSeed, nByte);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:23765:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zTitle[100];  /* The title text */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:23935:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pBt, &aAddr[1], pHdr->nBacktrace*sizeof(void*));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:23944:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(z, mem.zTitle, mem.nTitle);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:24011:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pNew, pPrior, (int)(nByte<pOldHdr->iSize ? nByte : pOldHdr->iSize));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:24117:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mem.zTitle, zTitle, n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:24141:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  out = fopen(zFilename, "w");
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:24730:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p, pPrior, nOld);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:24732:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p, pPrior, nBytes);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:24788:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out = fopen(zFilename, "w");
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:25287:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, pPrior, nOld);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:25408:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out = fopen(zFilename, "w");
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:27796:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pNew, p, lookasideMallocSize(db, p));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:27843:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zNew, z, n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:27856:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zNew, z, (size_t)n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:28189:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[etBUFSIZE];       /* Conversion buffer */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:28509:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf+(prefix!=0),"Inf",4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:28884:42:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      if( !isMalloced(p) && p->nChar>0 ) memcpy(zNew, p->zText, p->nChar);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:28919:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&p->zText[p->nChar], z, N);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:28938:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&p->zText[p->nChar-N], z, N);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:28960:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zText, p->zText, p->nChar+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:29073:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBase[SQLITE_PRINT_BUF_SIZE];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:29106:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBase[SQLITE_PRINT_BUF_SIZE];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:29193:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zMsg[SQLITE_PRINT_BUF_SIZE*3];    /* Complete log message */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:29222:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[500];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:29310:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[500];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:29354:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char zLine[1000];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:29385:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zLine[100];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:29603:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[30];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:29615:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[30];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:29654:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zFlgs[60];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:29685:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char zOp2[16];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:29838:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char zBuf[8];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:30054:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char s[256];          /* State variables */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:30107:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char k[256];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:30148:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:30155:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:30660:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[1000];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:30772:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[1000];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:30932:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char zBuf[20];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:31725:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pOut, &u, 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:31766:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pValue, &u, 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:32189:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&x,p,4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:32193:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&x,p,4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:32197:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&x,p,4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:32206:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p,&v,4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:32209:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p,&x,4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:32212:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p,&x,4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:32486:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&a, &x, 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:32583:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(z, zName, nName);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:33360:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char aPadding[32];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:33658:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return open(zFile, flags, mode);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:34263:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pNew->zCanonicalName, zAbsoluteName, n+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:34465:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char aSemName[MAX_PATHNAME+2];  /* Name of that semaphore */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:34523:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char aErr[80];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:34716:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pInode->fileId, &fileId, sizeof(fileId));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:36644:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pBuf, &((u8 *)(pFile->pMapRegion))[offset], amt);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:36648:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pBuf, &((u8 *)(pFile->pMapRegion))[offset], nCopy);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:36763:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char oldCntr[4];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:36779:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&((u8 *)(pFile->pMapRegion))[offset], pBuf, amt);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:36783:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&((u8 *)(pFile->pMapRegion))[offset], pBuf, nCopy);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:36966:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zDirname[MAX_PATHNAME+1];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:39147:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zDb[MAX_PATHNAME+1];     /* Database file path */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:39171:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zDb, zPath, nDb);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:39252:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zTmpname[MAX_PATHNAME+2];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:39447:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      useProxy = atoi(envforce)>0;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:39654:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(zDel, zIn, n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:39770:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zBuf, &t, sizeof(t));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:39771:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&zBuf[sizeof(t)], &randomnessPid, sizeof(randomnessPid));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40292:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tPath[MAXPATHLEN];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40293:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[PROXY_MAXCONCHLEN];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40297:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errmsg[64] = "";
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40386:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tBuf[PROXY_MAXCONCHLEN];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40436:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char readBuf[PROXY_MAXCONCHLEN];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40437:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lockPath[MAXPATHLEN];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40493:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(lockPath, &readBuf[PROXY_PATHINDEX], pathLen);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40539:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char writeBuffer[PROXY_MAXCONCHLEN];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40543:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&writeBuffer[PROXY_HEADERLEN], myHostID, PROXY_HOSTIDLEN);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40690:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(conchPath, dbPath, len+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40706:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&conchPath[i+1], "-conch", 7);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40766:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dbPath, (char *)pFile->lockingContext, len + 1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40785:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbPath[MAXPATHLEN+1];       /* Name of the database file */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:42312:41:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  { "MultiByteToWideChar",     (SYSCALL)MultiByteToWideChar,     0 },
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:42730:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zDbgBuf[SQLITE_WIN32_DBG_BUF_SIZE];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:42743:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zDbgBuf, zBuf, nMin);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:42759:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zDbgBuf, zBuf, nMin);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:43478:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zMsg[500];                 /* Human readable error text */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:44132:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pBuf, &((u8 *)(pFile->pMapRegion))[offset], amt);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:44138:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pBuf, &((u8 *)(pFile->pMapRegion))[offset], nCopy);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:44210:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&((u8 *)(pFile->pMapRegion))[offset], pBuf, amt);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:44216:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&((u8 *)(pFile->pMapRegion))[offset], pBuf, nCopy);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:47680:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if( iOfst<p->sz ) memcpy(zBuf, p->aData+iOfst, p->sz - iOfst);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:47683:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zBuf, p->aData+iOfst, iAmt);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:47728:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p->aData+iOfst, z, iAmt);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:48032:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      if( pOut ) memcpy(pOut, p->aData, p->sz);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:48062:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pTo, sqlite3PagerGetData(pPage), szPage);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:48374:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(aiValues, p->u.aHash, sizeof(p->u.aHash));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:48414:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(aiValues, p->u.aHash, sizeof(p->u.aHash));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:52077:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbFileVers[16];        /* Changes whenever database file changes */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:52415:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char zRet[1024];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:52523:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char ac[4];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:52542:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ac[4];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:52728:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char aMagic[8];   /* A buffer to hold the magic header */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:52822:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      static const char zeroHdr[28] = {0};
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:52910:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zHeader, aJournalMagic, sizeof(aJournalMagic));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:52987:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char aMagic[8];     /* A buffer to hold the magic header */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:53895:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pData, (u8*)aData, pPager->pageSize);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:55721:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(zHeader, aJournalMagic, sizeof(aJournalMagic));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:56295:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pPtr, zPathname, nPathname);   pPtr += nPathname + 1;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:56297:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pPtr, zUri, nUriByte);       pPtr += nUriByte;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:56307:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pPtr, zPathname, nPathname);   pPtr += nPathname;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:56308:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pPtr, "-journal",8);           pPtr += 8 + 1;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:56321:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pPtr, zPathname, nPathname);   pPtr += nPathname;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:56322:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pPtr, "-wal", 4);              pPtr += 4 + 1;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:56796:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char dbFileVers[sizeof(pPager->dbFileVers)];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:57750:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          const void *pCopy = (const void *)&((const char *)zBuf)[24];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:59922:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void*)&aHdr[1], (const void*)&pWal->hdr, sizeof(WalIndexHdr));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:59924:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void*)&aHdr[0], (const void*)&pWal->hdr, sizeof(WalIndexHdr));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:59953:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&aFrame[8], pWal->hdr.aSalt, 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:60034:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char zName[15];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:60411:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pWal->hdr.aSalt, &aBuf[16], 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:60718:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(aLeft, aTmp, sizeof(aTmp[0])*iOut);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:60945:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pWal->hdr.aSalt[1], &salt1, 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:61318:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pWal->hdr, &h1, sizeof(WalIndexHdr));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:61524:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pWal->hdr, (void*)walIndexHdr(pWal), sizeof(WalIndexHdr));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:62026:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&pWal->hdr, pSnapshot, sizeof(WalIndexHdr));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:62279:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pWal->hdr, (void *)walIndexHdr(pWal), sizeof(WalIndexHdr));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:62587:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&aWalHdr[16], pWal->hdr.aSalt, 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:62979:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pRet, &pWal->hdr, sizeof(WalIndexHdr));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:65603:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&temp[x], &data[x], (cbrk+size) - x);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:65606:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&data[cbrk], &src[pc], size);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:65663:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&aData[iAddr], &aData[pc], 2);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:66441:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char zDbHeader[100];  /* Database header content */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:66503:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(zFullPathname, zFilename, nFilename);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:67399:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(data, zMagicHeader, sizeof(zMagicHeader));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:68828:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pPayload, pBuf, nByte);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:68831:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pBuf, pPayload, nByte);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:69012:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(aSave, aWrite, 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:69016:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(aWrite, aSave, 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:70097:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&pPage1->aData[32], &pTrunk->aData[0], 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:70121:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&pPage1->aData[32], &pTrunk->aData[0], 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:70127:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&pPrevTrunk->aData[0], &pTrunk->aData[0], 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:70150:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&pNewTrunk->aData[0], &pTrunk->aData[0], 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:70152:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&pNewTrunk->aData[8], &pTrunk->aData[12], (k-1)*4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:70217:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&aData[8+closest*4], &aData[4+k*4], 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:70591:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pPayload, pSrc, nSrc);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:70649:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pPayload, pSrc, n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:70652:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pPayload, pSrc, n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:70810:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pTemp, pCell, sz);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:70854:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&data[idx+4], pCell+4, sz-4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:70857:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&data[idx], pCell, sz);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:71039:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pTmp[j], &aData[j], usableSize - j);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:71062:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pData, pCell, sz);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:71249:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pTmp, aData, pPg->pBt->usableSize);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:71530:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&aTo[iData], &aFrom[iData], pBt->usableSize-iData);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:71531:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&aTo[iToHdr], &aFrom[iFromHdr], pFrom->cellOffset + 2*pFrom->nCell);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:71729:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aOvflSpace[iOff], apDiv[i], szNew[i]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:71850:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pTemp, apDiv[i], sz);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:71859:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(b.apCell[b.nCell], &pOld->aData[8], 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:72110:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&apNew[nNew-1]->aData[8], &pOld->aData[8], 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:72185:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&pNew->aData[8], pCell, 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:72414:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pChild->aiOvfl, pRoot->aiOvfl,
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:72416:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pChild->apOvfl, pRoot->apOvfl,
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:72881:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(newCell, oldCell, 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:72905:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(oldCell, newCell, szNew);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:72961:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(pCur->pKey, pX->pKey, pX->nKey);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:74216:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zErr[100];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:74925:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zOut, zIn, nCopy);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:75570:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:75685:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pMem->zMalloc, pMem->z, pMem->n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:75875:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pMem, &t, sizeof(t));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:76430:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pTo, pFrom, MEMCELLSIZE);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:76447:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pTo, pFrom, MEMCELLSIZE);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:76471:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pTo, pFrom, sizeof(Mem));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:76545:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pMem->z, z, nAlloc);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:77426:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pStr->z, z, n+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:77733:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if( p4copy ) memcpy(p4copy, zP4, 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:78783:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zAlt[50];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:79129:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zPtr[50];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:79130:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zCom[100];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:79499:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char z[1000];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:80610:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *out = fopen("vdbe_profile.out", "a");
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:80628:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char zHdr[100];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:81096:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if( len>0 ) memcpy(buf, pMem->z, len);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:81153:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pMem->u.r, &x, sizeof(x));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:82851:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pNew, pOrig, MEMCELLSIZE);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:84655:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBase[100];         /* Initial working space */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:85328:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[1000];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:86174:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pOut, pVar, MEMCELLSIZE);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:86435:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pOut->z, pIn2->z, pIn2->n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:86439:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pOut->z[pIn2->n], pIn1->z, pIn1->n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:87667:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pDest->z, zData, len);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:88122:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pNew->zName, zName, nName+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:93909:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p->aAlloc, &p->aBuffer[iBuf], nAvail);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:93925:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&p->aAlloc[nByte - nRem], aNext, nCopy);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:94333:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pKeyInfo, pCsr->pKeyInfo, szKeyInfo);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:94837:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&p->aBuffer[p->iBufEnd], &pData[nData-nRem], nCopy);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:95221:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(SRVAL(pNew), pVal->z, pVal->n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:96064:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pOut->z, pKey, nKey);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:96242:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zOut, (u8*)pChunk->zChunk + iChunkOffset, nCopy);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:96340:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy((u8*)p->pFirst->zChunk, zBuf, iAmt);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:96368:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((u8*)p->endpoint.pChunk->zChunk + iChunkOffset, zWrite, iSpace);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:96858:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pExpr, pDup, sizeof(*pExpr));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:99490:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        if( pToken->n ) memcpy(pNew->u.zToken, pToken->z, pToken->n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:99971:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zAlloc, p, nNewSize);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:99974:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zAlloc, p, nSize);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:99988:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zToken, p->u.zToken, nToken);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:105087:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pNew->aCol, pTab->aCol, sizeof(Column)*pNew->nCol);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:105704:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zOut, zSql, nSql);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:105727:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&zOut[iOff], zReplace, nReplace);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:106640:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p->u.aRowid, pData, n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:106667:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pTo->anEq, pFrom->anEq, sizeof(tRowcnt)*p->nCol);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:106668:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pTo->anLt, pFrom->anLt, sizeof(tRowcnt)*p->nCol);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:106669:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pTo->anDLt, pFrom->anDLt, sizeof(tRowcnt)*p->nCol);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:107323:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pStat1->zName, "sqlite_stat1", 13);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:108083:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pSample->p, sqlite3_column_blob(pStmt, 4), pSample->n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:108283:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  zFile = (const char *)sqlite3_value_text(argv[0]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:108284:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  zName = (const char *)sqlite3_value_text(argv[1]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:108335:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(aNew, db->aDb, sizeof(db->aDb[0])*2);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:108410:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        zKey = (char *)sqlite3_value_blob(argv[2]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:108499:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *zName = (const char *)sqlite3_value_text(argv[0]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:108504:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zErr[128];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:109378:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char saveBuf[PARSE_TAIL_SZ];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:109394:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(saveBuf, PARSE_TAIL(pParse), PARSE_TAIL_SZ);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:109399:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(PARSE_TAIL(pParse), saveBuf, PARSE_TAIL_SZ);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:109643:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(db->aDbStatic, db->aDb, 2*sizeof(db->aDb[0]));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:110342:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(z, pName->z, pName->n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:110378:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zType, pType->z, pType->n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:110943:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&zStmt[k], zType, len);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:110963:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zExtra, pIdx->azColl, sizeof(char*)*pIdx->nColumn);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:110966:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zExtra, pIdx->aiColumn, sizeof(i16)*pIdx->nColumn);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:110969:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zExtra, pIdx->aSortOrder, pIdx->nColumn);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:111960:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zTab[24];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:112248:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(z, pTo->z, pTo->n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:112282:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(z, pToCol->a[i].zEName, n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:112750:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pIndex->zName, zName, nName+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:112829:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zExtra, zColl, nColl);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:113127:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&a[1], aVal, nCopy*sizeof(LogEst));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:114210:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pColl, pColl2, sizeof(CollSeq));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:114276:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pColl[0].zName, zName, nName);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:114598:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char*)&pBest[1], zName, nName+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:116373:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char zStop[3];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:116676:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char zBuf[50];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:116929:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&zOut[j], zRep, nRep);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:116935:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&zOut[j], &zStr[i], nStr-i);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:117063:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zResult[8];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:117112:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *zFile = (const char *)sqlite3_value_text(argv[0]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:117126:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    zProc = (const char *)sqlite3_value_text(argv[1]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:117530:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(aWc, pDef->pUserData, 3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:119009:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy((char *)pStep->zTarget, zFrom, nFrom);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:122278:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int  (*open)(const char*,sqlite3**);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:122599:53:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define sqlite3_open                   sqlite3_api->open
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:123378:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zAltEntry, "sqlite3_", 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:123387:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zAltEntry+iEntry, "_init", 6);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:123423:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(aHandle, db->aExtension, sizeof(handle)*db->nExtension);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:124718:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *aFcntl[4];       /* Argument to SQLITE_FCNTL_PRAGMA */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:126559:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char zBuf[40];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:126637:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *azArg[2];           /* Value of the argument and schema */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:126656:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[200];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:127110:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char const *azArg[6];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:129954:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&pCol->zName[n+1], zType, m+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:134746:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(z, argv[i], n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:135275:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(z, pName->z, pName->n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:137869:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zCopy, zName, nName+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:138966:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char*)&pNew[1], pDef->zName, sqlite3Strlen30(pDef->zName)+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:139885:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[100];               /* Initial space for EQP output string */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:140602:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char d2[4];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:140875:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pNew->orig, pExpr, sizeof(*pExpr));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:141814:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pOrTab->a, pTabItem, sizeof(*pTabItem));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:142289:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pWC->a, pOld, sizeof(pWC->a[0])*pWC->nTerm);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:143964:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(aiCur, pWInfo->aiCurOnePass, sizeof(int)*2);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:143988:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pDest->a, pSrc->a, pDest->n*sizeof(pDest->a[0]));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:145571:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zType[8];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:145572:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zLeft[50];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:145573:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zType, "....", 5);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:145718:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(paNew, p->aLTerm, sizeof(p->aLTerm[0])*p->nLSlot);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:145734:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pTo, pFrom, WHERE_LOOP_XFER_SZ);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:145735:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pTo->aLTerm, pFrom->aLTerm, pTo->nLTerm*sizeof(pTo->aLTerm[0]));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:147810:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char zName[65];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:148120:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pTo->aLoop, pFrom->aLoop, sizeof(WhereLoop*)*iLoop);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:149291:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p->pExpr, &p->orig, sizeof(p->orig));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:150334:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pTab, pTab2, sizeof(Table));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:152440:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p->u.zToken, t.z, t.n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:154530:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char yycoverage[YYNSTATE][YYNTOKEN];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:157500:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char zKWText[647] = {
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:157539:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char aKWHash[127] = {
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:157554:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char aKWNext[145] = {
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:157569:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char aKWLen[145] = {
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:157600:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char aKWCode[145] = {
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:159341:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&y, &x, 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:160524:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char zBuf[50];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:162027:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zFile, zUri, nUri);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:162064:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zDecoded[40];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:162698:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zMsg[100];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:163903:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(pNew, aArg, nArg*sizeof(void *));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166039:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, zCol, n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166336:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p->aIndex, aIndex, sizeof(struct Fts3Index) * nIndex);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166346:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zCsr, argv[2], nName);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166349:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zCsr, argv[1], nDb);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166356:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    z = (char *)sqlite3Fts3NextToken(aCol[iCol], &n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166358:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zCsr, z, n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166364:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    assert( zCsr <= &((char *)p)[nByte] );
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166846:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&zBuffer[nPrefix], zCsr, nSuffix);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:167004:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, *ppPoslist, n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:167042:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, *ppPoslist, n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:167374:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *aaOutput[16];             /* Malloc'd output buffers */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:167779:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pTS->aaOutput[0], aDoclist, nDoclist);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:168698:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      zArg = (const char *)sqlite3_value_text(apVal[1]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:169615:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(aDoclist, a[p->nToken-1].pList, nByte+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:171087:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char *)p->pFts3Tab->zDb, zDb, nDb);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:171088:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char *)p->pFts3Tab->zName, zFts3, nFts3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:171746:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pRet->pPhrase->aToken[0].z, zToken, nToken);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:171861:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&zTemp[nTemp], zByte, nByte);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:171889:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zBuf, zTemp, nTemp);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:172745:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  zExpr = (const char *)sqlite3_value_text(argv[1]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:172754:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    azCol[ii] = (char *)sqlite3_value_text(argv[ii+2]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:173193:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void*)new_elem->pKey, pKey, nKey);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:173553:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zReverse[28];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:174153:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *azArg[64];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:174170:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  zName = (const char *)sqlite3_value_text(argv[0]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:174172:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  zInput = (const char *)sqlite3_value_text(argv[argc-1]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:174188:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    azArg[i-1] = (const char *)sqlite3_value_text(argv[i]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:174271:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy((void *)pp, sqlite3_column_blob(pStmt, 0), sizeof(*pp));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:174435:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char delim[128];             /* flag ASCII delimiters */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:174768:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pSpace, argv[i], n+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:174982:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *zByte = (const char *)sqlite3_value_text(apVal[0]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:174988:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pCsr->zInput, zByte, nByte);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:176021:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      const char *zText = (const char *)sqlite3_value_text(apVal[i]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:176433:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(aCopy, pList->aData, nCopy);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:176498:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pReader->zTerm[nPrefix], pNext, nSuffix);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:176735:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if( nRoot ) memcpy(pReader->aNode, zRoot, nRoot);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:176859:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pReader->ppNextElem, aElem, nElem*sizeof(Fts3HashElem *));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:177157:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&pTree->aData[nData], &zTerm[nPrefix], nSuffix);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:177171:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pTree->zTerm, zTerm, nTerm);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:177428:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pWriter->aData[nData], &zTerm[nPrefix], nSuffix);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:177432:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pWriter->aData[nData], aDoclist, nDoclist);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:177452:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pWriter->zTerm, zTerm, nTerm);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:177761:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pMsr->aBuffer, pList, nList);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:178105:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(&pCsr->aBuffer[nDoclist], pList, nList);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:178867:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&p->term.a[nPrefix], &p->aNode[p->iOff], nSuffix);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:178974:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&pBlk->a[pBlk->n], &zTerm[nPrefix], nSuffix);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:178977:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pNode->key.a, zTerm, nTerm);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:179051:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pPrev->a, zTerm, nTerm);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:179058:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pNode->a[pNode->n], &zTerm[nPrefix], nSuffix);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:179063:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pNode->a[pNode->n], aDoclist, nDoclist);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:179404:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pNode->block.a, aRoot, nRoot);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:179418:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pNode->key.a, reader.term.a, reader.term.n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:179430:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(pNode->block.a, aBlock, nBlock);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:179901:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(pHint->a, aHint, nHint);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:180491:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      v = atoi(&zVal[9]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:180495:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      v = atoi(&zVal[11]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:180499:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      p->bNoIncrDoclist = atoi(&zVal[21]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:180502:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      v = atoi(&zVal[11]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:180623:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pRet, &p->pList->aData[nSkip], *pnData);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:181016:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pRet->zMatchinfo, zMatchinfo, nStr+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:181057:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      if( p->bGlobal ) memcpy(aOut, &p->aMatchinfo[1], p->nElem*sizeof(u32));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:181067:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&p->aMatchinfo[2+p->nElem], &p->aMatchinfo[1], p->nElem*sizeof(u32));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:181495:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pStr->z[pStr->n], zAppend, nAppend);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:182561:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char aBuffer[64];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:183520:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zSpace[100];        /* Initial static space */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:183646:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zNew, p->zBuf, (size_t)p->nUsed);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:183665:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p->zBuf+p->nUsed, zIn, N);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:184484:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char*)p->zJson, zJson, nJson+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:185818:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p->zJson, z, (size_t)n+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:185840:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p->zRoot, zRoot, (size_t)n+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:186516:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&x, p, 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:186520:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&x, p, 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:186524:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&x, p, 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:186556:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, &i, 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:186559:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, &i, 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:186562:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, &i, 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:186575:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, &i, 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:186578:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, &i, 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:186580:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, &i, 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:187182:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&c.u,a,4);                                           \
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:187190:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&c.u,a,4);                                           \
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:187814:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pBlob, pSrc, pSrc->iSize);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:187991:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zIdxStr[RTREE_MAX_DIMENSIONS*8+1];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:188157:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&cell, p, sizeof(RtreeCell));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:188341:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(aSpare, aLeft, sizeof(int)*nLeft);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:188410:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(aSpare, aLeft, sizeof(int)*nLeft);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:188501:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&left, &aCell[aaSorted[ii][0]], sizeof(RtreeCell));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:188502:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&right, &aCell[aaSorted[ii][nCell-1]], sizeof(RtreeCell));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:188531:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pBboxLeft, &aCell[aaSorted[iBestDim][0]], sizeof(RtreeCell));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:188532:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pBboxRight, &aCell[aaSorted[iBestDim][iBestSplit]], sizeof(RtreeCell));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:188599:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&aCell[nCell], pCell, sizeof(RtreeCell));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:188894:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&aCell[ii], pCell, sizeof(RtreeCell));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:189511:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char *azSql[N_STATEMENT] = {
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:189765:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pRtree->zDb, argv[1], nDb);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:189766:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pRtree->zName, argv[2], nName);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:190037:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pRet, pNode, nNode);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:190070:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *azSql[2] = {
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:190503:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char hdr[4]; /* Header for on-disk representation */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:190661:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pOut->a, s.a, s.nVertex*2*sizeof(GeoCoord));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:190709:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p->hdr, a, nByte);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:191118:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pBBox->a, a, sizeof(RtreeCoord)*4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:191448:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char aOverlap[4];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:191635:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pRtree->zDb, argv[1], nDb);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:191636:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pRtree->zName, argv[2], nName);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:192437:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[128];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:192748:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    zLocale = (const char *)sqlite3_value_text(apArg[1]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:192850:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  zLocale = (const char *)sqlite3_value_text(apArg[0]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:192851:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  zName = (const char *)sqlite3_value_text(apArg[1]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:193003:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p->zLocale, argv[0], n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:194184:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zStateDb[5];               /* Db name for state ("stat" or "main") */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:194405:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(zOut, &zSrc[ofst], cnt);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:194420:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(zOut, zDelta, cnt);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:194917:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(zRet, zStr, nCopy);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:195071:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pIter->abIndexed, pIter->abTblPk, sizeof(u8)*pIter->nTblCol);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:196423:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pUp->zMask, zMask, pIter->nTblCol);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:196581:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p->zStateDb, "stat", 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:196583:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p->zStateDb, "main", 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:196949:11:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  nChar = MultiByteToWideChar(CP_UTF8, 0, zFilename, -1, NULL, 0);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:196958:11:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  nChar = MultiByteToWideChar(CP_UTF8, 0, zFilename, -1, zWideFilename,
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:197630:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zRnd[64];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:197775:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p->zTarget, zTarget, nTarget+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:197779:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p->zRbu, zRbu, nRbu+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:198813:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(zCopy, zBase, nCopy);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:199068:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&pNew->base, &vfs_template, sizeof(sqlite3_vfs));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:199073:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zSpace, zName, nName);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:200318:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(sqlite3PagerGetData(pDbPage),
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:200779:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&i, &r, 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:200803:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          if( n ) memcpy(&aBuf[nVarint + 1], z, n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:200909:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&iVal, &rVal, 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:201065:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(aOut, a2, n2);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:201068:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(aOut, a1, n1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:201163:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(aOut, aOld, nOld);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:201191:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(aOut, aNew, nNew);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:201253:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&rVal, &iVal, 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:201412:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pAlloc, zThis, nThis+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:201422:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pAlloc, zName, nName+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:202076:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pNew->zDb, zDb, nDb+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:202201:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pTab->zName, zName, nName+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:202301:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&p->aBuf[p->nBuf], aBlob, nBlob);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:202321:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&p->aBuf[p->nBuf], zStr, nStr);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:202339:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char aBuf[24];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:202394:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&i, &r, 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:202477:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&dVal, &iVal, 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:202683:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&rVal, &iVal, 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:203127:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(aCopy, aData, nData);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:203204:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&d, &v, 8);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:203339:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&p->tblhdr.aBuf[iPK], &p->in.aData[p->in.iNext], nCopy);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:205021:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pNew->aRecord, aRec, nRec);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:205033:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(pOut, pIn, nIn);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:205065:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pOut, a1, n1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:205068:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pOut, a2, n2);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:205131:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(aCsr, aRec, nRec);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:205156:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(aCsr, aRec, nRec);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:205226:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pTab->abPK, abPK, nCol);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:205228:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pTab->zName, zNew, nNew+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:205519:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pOut, a2, nn2);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:205522:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pOut, a1, nn1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:205575:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pOut, a1, n1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:205579:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pOut, a2, n2);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:205593:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(pOut, a1, n1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:207957:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char fts5yycoverage[fts5YYNSTATE][fts5YYNFTS5TOKEN];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:209547:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pBuf->p[pBuf->n], pData, nData);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:209760:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zRet, pIn, nIn);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:209855:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pEntry->pTerm, pTerm, nTerm);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:210195:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pSpace, p2, p-p2);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:210317:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zOut, zIn, (size_t)(nIn+1));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:210661:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      if( zRank ) memcpy(zRank, pRank, p-pRank);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:210681:27:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          if( zRankArgs ) memcpy(zRankArgs, pArgs, p-pArgs);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:211243:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(aNew, aIter, sizeof(Fts5PoslistReader) * nIter);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:212446:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pSyn->zTerm, pToken, nToken);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:212604:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pColset, pColsetOrig, (size_t)nByte);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:212821:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pRet, pOrig, (size_t)nByte);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:212949:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&p->apChild[p->nChild], pSub->apChild, nByte);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:214024:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&zKey[1], pToken, nToken);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:214244:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&pRet[nPre], &((u8*)p)[nHashPre], nList);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:215396:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&(pBuf)->p[(pBuf)->n], pBlob, nBlob);             \
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:215494:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pOut->aSeg, &pLvl->aSeg[is], sizeof(Fts5StructureSegment));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:219460:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      if( doclist.n ) memcpy(pData->p, doclist.p, doclist.n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:219707:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if( nToken ) memcpy(&buf.p[1], pToken, nToken);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:220676:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if( n>0 ) memcpy(a, aBlob, n);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:223499:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pAux->zFunc, zName, nName);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:223537:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pNew->zName, zName, nName);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:224975:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char aAsciiTokenChar[128] = {
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:224988:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char aTokenChar[128];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225031:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p->aTokenChar, aAsciiTokenChar, sizeof(aAsciiTokenChar));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225079:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char aFold[64];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225184:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char aTokenChar[128];  /* ASCII range token characters */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225191:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char aCategory[32];    /* True for token char categories */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225450:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(aFold, p->aFold, nFold);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225504:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char aBuf[FTS5_PORTER_MAX_TOKEN + 64];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225591:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&aBuf[nStem], p->zOutput, p->nOutput);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225830:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&aBuf[nBuf-2], "ate", 3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225838:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&aBuf[nBuf-2], "ble", 3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225846:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&aBuf[nBuf-2], "ize", 3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225865:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-7], "ate", 3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225870:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-6], "tion", 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225879:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-4], "ence", 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225884:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-4], "ance", 4);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225893:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-4], "ize", 3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225902:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-4], "log", 3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225911:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-3], "ble", 3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225916:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-4], "al", 2);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225921:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-5], "ent", 3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225926:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-3], "e", 1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225931:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-5], "ous", 3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225940:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-7], "ize", 3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225945:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-5], "ate", 3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225950:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-4], "ate", 3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225959:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-5], "al", 2);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225964:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-7], "ive", 3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225969:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-7], "ful", 3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225974:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-7], "ous", 3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225983:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-5], "al", 2);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225988:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-5], "ive", 3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225993:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-6], "ble", 3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:226012:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-4], "ic", 2);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:226029:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-5], "ic", 2);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:226034:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-5], "ic", 2);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:226059:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-5], "al", 2);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:226078:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-3], "ee", 2);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:226141:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(aBuf, pToken, nBuf);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:227573:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pRet->zFts5Tbl, zTab, nTab);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:227574:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pRet->zFts5Db, zDb, nDb);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:227992:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pCsr->zLeTerm, zCopy, pCsr->nLeTerm+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.h:9423:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char hidden[48];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3ext.h:113:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int  (*open)(const char*,sqlite3**);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3ext.h:434:53:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define sqlite3_open                   sqlite3_api->open
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/blast/blast.c:58:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char out[MAXWIN];  /* output buffer and sliding window */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/blast/blast.c:312:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char extra[16] = {     /* extra bits for length codes */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/blast/blast.c:434:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char hold[CHUNK];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream/zfstream.cpp:18:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
gzfilebuf *gzfilebuf::open( const char *name,
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream/zfstream.cpp:24:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char char_mode[10];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream/zfstream.cpp:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char char_mode[10];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream/zfstream.cpp:270:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
void gzfilestream_common::open( const char *name, int io_mode ) {
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream/zfstream.cpp:272:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( !buffer.open( name, io_mode ) )
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream/zfstream.cpp:300:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  gzfilestream_common::open( name, io_mode );
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream/zfstream.cpp:320:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  gzfilestream_common::open( name, io_mode );
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream/zfstream.h:15:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  gzfilebuf *open( const char *name, int io_mode );
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream/zfstream.h:55:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  void open( const char *name, int io_mode );
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream2/zstream.h:55:40:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        izstream(FILE* fp) : m_fp(0) { open(fp); }
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream2/zstream.h:56:48:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        izstream(const char* name) : m_fp(0) { open(name); }
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream2/zstream.h:65:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        void open(const char* name) {
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream2/zstream.h:70:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        void open(FILE* fp) {
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream2/zstream.h:162:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            open(fp, level);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream2/zstream.h:166:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            open(name, level);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream2/zstream.h:177:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        void open(const char* name, int level = Z_DEFAULT_COMPRESSION) {
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream2/zstream.h:178:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char mode[4] = "wb\0";
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream2/zstream.h:186:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        void open(FILE* fp, int level = Z_DEFAULT_COMPRESSION) {
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream2/zstream.h:188:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char mode[4] = "wb\0";
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream2/zstream_test.cpp:7:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char h[256] = "Hello";
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream2/zstream_test.cpp:19:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out.open("temp.gz"); // try ascii output; zcat temp.gz to see the results
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/test.cc:15:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[80];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/test.cc:17:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  outf.open("test1.txt.gz");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/test.cc:26:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  inf.open("test1.txt.gz");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/test.cc:33:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  outf.open("test2.txt.gz");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/test.cc:42:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  inf.open("test2.txt.gz");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:51:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
gzfilebuf::open(const char *name,
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char char_mode[6] = "\0\0\0\0\0";
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:90:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char char_mode[6] = "\0\0\0\0\0";
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:384:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->open(name, mode);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:398:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
gzifstream::open(const char* name,
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:401:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (!sb.open(name, mode | std::ios_base::in))
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:439:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  this->open(name, mode);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:453:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
gzofstream::open(const char* name,
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:456:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (!sb.open(name, mode | std::ios_base::out))
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.h:66:3:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  open(const char* name,
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.h:285:3:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  open(const char* name,
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.h:374:3:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  open(const char* name,
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/crypt.h:100:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char header[RAND_HEAD_LEN-2]; /* random header */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/ioapi.c:19:36:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define FOPEN_FUNC(filename, mode) fopen(filename, mode)
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/ioapi.c:109:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        file = fopen(filename, mode_fopen);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/ioapi.h:49:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define fopen64 fopen
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/ioapi.h:54:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define fopen64 fopen
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/ioapi.h:59:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 #define fopen64 fopen
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/iowin32.c:112:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        MultiByteToWideChar(CP_ACP,0,(const char*)filename,-1,filenameW,FILENAME_MAX + 0x200);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/iowin32.c:137:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        MultiByteToWideChar(CP_ACP,0,(const char*)filename,-1,filenameW,FILENAME_MAX + 0x200);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/iowin32.c:185:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        MultiByteToWideChar(CP_ACP,0,(const char*)filename,-1,filenameW,FILENAME_MAX + 0x200);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/miniunz.c:32:36:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define FOPEN_FUNC(filename, mode) fopen(filename, mode)
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/miniunz.c:209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char number[21];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/miniunz.c:248:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char filename_inzip[256];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/miniunz.c:318:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename_inzip[256];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/miniunz.c:386:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char answer[128];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/miniunz.c:541:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename_try[MAXFILENAME+16] = "";
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/miniunz.c:621:13:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
            strcat(filename_try,".zip");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/minizip.c:33:36:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define FOPEN_FUNC(filename, mode) fopen(filename, mode)
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/minizip.c:110:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAXFILENAME+1];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/minizip.c:255:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename_try[MAXFILENAME+16];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/minizip.c:334:13:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
            strcat(filename_try,".zip");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/minizip.c:349:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char answer[128];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/mztools.c:38:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fpZip = fopen(file, "rb");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/mztools.c:39:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fpOut = fopen(fileOut, "wb");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/mztools.c:40:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fpOutCD = fopen(fileOutTmp, "wb");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/mztools.c:44:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char header[30];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/mztools.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[1024];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/mztools.c:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char extra[1024];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/mztools.c:149:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char header[46];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/mztools.c:224:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char header[22];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/mztools.c:257:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fpOutCD = fopen(fileOutTmp, "rb");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/mztools.c:260:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[8192];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/unzip.c:1266:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szCurrentFileName[UNZ_MAXFILENAMEINZIP+1];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/unzip.c:1482:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char source[12];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/zip.c:120:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char data[SIZEDATA_INDATABLOCK];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/zip.c:289:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[8];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/zip.c:1246:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char bufHead[RAND_HEAD_LEN];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/zip.c:1980:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pTmp, p, dataSize + 4);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/zip.c:1994:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pData, pNewHeader, size);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/puff/pufftest.c:70:33:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    in = name == NULL ? stdin : fopen(name, "rb");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/puff/pufftest.c:105:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                skip = (unsigned)atoi(arg + 1);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/testzlib/testzlib.c:124:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    stream=fopen(filename, "rb");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/testzlib/testzlib.c:175:27:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        BlockSizeCompress=atol(argv[2]);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/testzlib/testzlib.c:178:29:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        BlockSizeUncompress=atol(argv[3]);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/testzlib/testzlib.c:181:23:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        cprLevel=(int)atol(argv[4]);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[100];               /*   0 */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:71:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mode[8];                 /* 100 */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:72:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uid[8];                  /* 108 */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:73:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char gid[8];                  /* 116 */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:74:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char size[12];                /* 124 */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mtime[12];               /* 136 */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:76:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char chksum[8];               /* 148 */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:78:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char linkname[100];           /* 157 */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:79:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char magic[6];                /* 257 */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:80:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char version[2];              /* 263 */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:81:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uname[32];               /* 265 */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:82:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char gname[32];               /* 297 */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:83:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char devmajor[8];             /* 329 */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:84:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char devminor[8];             /* 337 */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:85:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char prefix[155];             /* 345 */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:91:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               buffer[BLOCKSIZE];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:134:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buffer[1024];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:194:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char result[32];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:197:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(result,"%4d/%02d/%02d %02d:%02d:%02d",
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:394:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   fname[BLOCKSIZE];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:482:33:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                      outfile = fopen(fname,"wb");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:490:37:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                          outfile = fopen(fname,"wb");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/crc32.c:143:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        out = fopen("crc32.h", "w");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/enough.c:476:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        syms = atoi(argv[1]);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/enough.c:478:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            root = atoi(argv[2]);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/enough.c:480:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                max = atoi(argv[3]);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/fitblk.c:76:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char raw[RAWLEN];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/fitblk.c:99:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char raw[RAWLEN];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gun.c:161:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char inbuf[SIZE];              /* input buffer */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gun.c:162:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char outbuf[SIZE];             /* output buffer */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gun.c:164:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char suffix[65536];            /* one-character LZW suffix */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gun.c:165:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char match[65280 + 2];         /* buffer for reversed match or gzip
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gun.c:559:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        infile = open(inname, O_RDONLY, 0);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gun.c:572:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        outfile = open(outname, O_CREAT | O_TRUNC | O_WRONLY, 0666);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gun.c:689:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(outname, *argv, len);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzappend.c:140:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(list, list + 1, len - 1);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzappend.c:270:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    gz.fd = open(name, O_RDWR, 0);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzappend.c:397:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(name, O_RDONLY, 0);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzjoin.c:108:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    in->fd = open(name, O_RDONLY, 0);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:290:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char id[4];     /* contains LOGID to detect inadvertent overwrites */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:353:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(log->end, ".lock");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:354:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    while ((fd = open(log->path, O_CREAT | O_EXCL, 0644)) < 0) {
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:376:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(log->end, ".lock");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:388:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(log->end, ".lock");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:400:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(log->end, ".lock");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:413:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[HEAD + EXTRA];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:440:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ext[EXTRA];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:465:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[6];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:505:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[8];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:559:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(log->end, ".add");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:577:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(log->end, ".add");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:582:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(log->end, ".dict");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:587:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(log->end, ".temp");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:615:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[DICT];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:628:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(log->end, ".dict");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:629:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(log->path, O_RDONLY, 0);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:724:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(log->end, ".repairs");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:725:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    rec = fopen(log->path, "a");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:750:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(log->end, ".add");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:758:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            if ((fd = open(log->path, O_RDONLY, 0)) < 0) {
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:828:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(log->end, ".gz");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:829:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    log->fd = open(log->path, O_RDWR | O_CREAT, 0644);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:843:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(log->end, ".dict");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:913:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char *data, buf[5];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:952:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(log->end, ".add");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:953:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(log->path, O_WRONLY | O_CREAT | O_TRUNC, 0644);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:962:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(log->end, ".temp");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:963:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(log->path, O_WRONLY | O_CREAT | O_TRUNC, 0644);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:1013:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(log->end, ".add");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:1014:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(log->path, O_WRONLY | O_CREAT | O_TRUNC, 0644);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:1056:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(log->id, "bad");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zpipe.c:41:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char in[CHUNK];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zpipe.c:42:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char out[CHUNK];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zpipe.c:97:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char in[CHUNK];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zpipe.c:98:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char out[CHUNK];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c:71:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char window[WINSIZE];  /* preceding 32K of uncompressed data */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c:127:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(next->window, window + WINSIZE - left, left);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c:129:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(next->window + left, window, WINSIZE - left);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c:151:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char input[CHUNK];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c:152:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char window[WINSIZE];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c:255:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char input[CHUNK];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c:256:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char discard[WINSIZE];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c:360:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[CHUNK];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c:367:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    in = fopen(argv[1], "rb");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzguts.h:47:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define open _open
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzlib.c:36:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[1024];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzlib.c:65:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "unknown win32 error (%ld)", error);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzlib.c:245:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        open((const char *)path, oflag, 0666));
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzlib.c:298:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(path, "<fd:%d>", fd);   /* for debugging */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzlib.c:615:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(state->msg, ": ");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzread.c:161:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(state->x.next, strm->next_in, strm->avail_in);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzread.c:325:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, state->x.next, n);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzread.c:451:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[1];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzread.c:591:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, state->x.next, n);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzwrite.c:213:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(state->in + have, buf, copy);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzwrite.c:309:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[1];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzwrite.c:444:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(state->in, state->in + state->size, left);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzwrite.c:543:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(state->in, state->in + state->size, left);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/inflate.c:640:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hbuf[4];      /* buffer for gzip header crc calculation */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/inflate.c:1405:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4];       /* to restore bit buffer to byte string */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/example.c:98:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy((char*)uncompr, "garbage");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/example.c:149:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy((char*)uncompr, "garbage");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/example.c:245:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy((char*)uncompr, "garbage");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/example.c:341:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy((char*)uncompr, "garbage");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/example.c:420:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy((char*)uncompr, "garbage");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/example.c:501:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy((char*)uncompr, "garbage");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/infcover.c:392:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dict[257];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/infcover.c:474:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char win[32768];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/infcover.c:530:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(prefix, "-late");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/infcover.c:556:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(prefix, "-back");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:83:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[1024];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:112:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "unknown win32 error (%ld)", error);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:223:31:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                              fopen(path, gz->write ? "wb" : "rb");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:242:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char out[BUFLEN];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:267:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char in[1];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:301:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char out[BUFLEN];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:366:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    local char buf[BUFLEN];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:434:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    local char buf[BUFLEN];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:461:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    local char outfile[MAX_NAME_LEN];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:477:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    in = fopen(file, "rb");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:499:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    local char buf[MAX_NAME_LEN];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:534:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out = fopen(outfile, "wb");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:563:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *bname, outmode[20];
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:568:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(outmode, "wb6 ");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:633:33:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                    FILE * in = fopen(*argv, "rb");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/trees.c:328:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *header = fopen("trees.h", "w");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/zutil.c:13:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
z_const char * const z_errmsg[10] = {
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/zutil.h:49:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern z_const char * const z_errmsg[10]; /* indexed by 2-zlib_error */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/zutil.h:109:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     fopen((name), (mode), "mbc=60", "ctx=stm", "rfm=fix", "mrs=512")
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/zutil.h:202:30:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define F_OPEN(name, mode) fopen((name), (mode))
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/zutil.h:226:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#    define zmemcpy memcpy
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:582:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define DKBUF	char kbuf[DKBUF_MAXKEYSIZE*2+1]
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:703:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char pad[(sizeof(MDB_rxbody)+CACHELINE-1) & ~(CACHELINE-1)];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:728:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	mtb_rmname[MNAME_LEN];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:757:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char pad[(sizeof(MDB_txbody)+CACHELINE-1) & ~(CACHELINE-1)];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:761:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char mt2_wmname[MNAME_LEN];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:767:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char pad[(MNAME_LEN+CACHELINE-1) & ~(CACHELINE-1)];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:915:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		mn_data[1];			/**< key and data are appended here */
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:1057:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		mm_pad[PAGEHDRSZ];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:1481:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MSGSIZE+PADSIZE], *ptr = buf;
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:1535:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[400];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:1536:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%.100s:%d: Assertion '%.200s' failed in %.40s()",
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:1580:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		ptr += sprintf(ptr, "%02x", *c++);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:1582:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%.*s", key->mv_size, key->mv_data);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:1590:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char *const tp[2][2] = {{"", ": DB"}, {": sub-page", ": sub-DB"}};
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:2333:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, src, (lower + PAGEBASE + (Align-1)) & -Align);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:2334:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((pgno_t *)((char *)dst+upper), (pgno_t *)((char *)src+upper),
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:2337:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, src, psize - unused);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:2377:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(np, mp, num * env->me_psize);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:2771:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(txn->mt_dbiseqs, env->me_dbiseqs, env->me_maxdbs * sizeof(unsigned int));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:2775:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(txn->mt_dbs, meta->mm_dbs, CORE_DBS * sizeof(MDB_db));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:2884:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(txn->mt_dbs, parent->mt_dbs, txn->mt_numdbs * sizeof(MDB_db));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:2895:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(env->me_pghead, ntxn->mnt_pgstate.mf_pghead, size);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:3182:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(data.mv_data, free_pgs, data.mv_size);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:3496:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(parent->mt_dbs, txn->mt_dbs, txn->mt_numdbs * sizeof(MDB_db));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4283:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(fname->mn_val, which & MDB_O_MASK, mode);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4358:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					i = atoi(uts.release+7);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4362:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					i = atoi(uts.release+7);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4367:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				i = atoi(uts.release+2);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4371:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					i = atoi(uts.release+4);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4375:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					i = atoi(uts.release+4);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4816:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char encbuf[11];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4847:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char encbuf[11];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:5625:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&flags, ((char *) data.mv_data + offsetof(MDB_db, md_flags)),
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:5632:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(mc->mc_db, data.mv_data, sizeof(MDB_db));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:6686:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ptr, key->mv_data, ksize);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:6747:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				dkey.mv_data = memcpy(fp+1, olddata.mv_data, olddata.mv_size);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:6828:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(METADATA(mp), METADATA(fp), NUMKEYS(fp) * fp->mp_pad);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:6830:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy((char *)mp + mp->mp_upper + PAGEBASE, (char *)fp + fp->mp_upper + PAGEBASE,
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:6832:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy((char *)(&mp->mp_ptrs), (char *)(&fp->mp_ptrs), NUMKEYS(fp) * sizeof(mp->mp_ptrs[0]));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:6898:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy((size_t *)((char *)np + off),
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:6902:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(np, omp, sz); /* Copy beginning of page */
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:6909:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(METADATA(omp), data->mv_data, data->mv_size);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:6923:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(olddata.mv_data, data->mv_data, data->mv_size);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:6925:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(NODEKEY(leaf), key->mv_data, key->mv_size);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:7024:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(db, &mc->mc_xcursor->mx_db, sizeof(MDB_db));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:7046:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					data[0].mv_data = (char *)data[0].mv_data + data[0].mv_size;
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:7106:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(db, &mc->mc_xcursor->mx_db, sizeof(MDB_db));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:7294:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr, key->mv_data, ksize);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:7354:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(NODEKEY(node), key->mv_data, key->mv_size);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:7360:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ndata, data->mv_data, sizeof(pgno_t));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:7364:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ndata, data->mv_data, data->mv_size);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:7366:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ndata, &ofp->mp_pgno, sizeof(pgno_t));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:7371:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ndata, data->mv_data, data->mv_size);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:7530:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&mx->mx_db, NODEDATA(node), sizeof(MDB_db));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:7767:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char kbuf2[DKBUF_MAXKEYSIZE*2+1];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:7813:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(NODEKEY(node), key->mv_data, key->mv_size);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:8691:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(rp->mp_ptrs, split, rsize);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:8694:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ins, newkey->mv_data, ksize);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:8699:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(rp->mp_ptrs, split, x * ksize);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:8701:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ins, newkey->mv_data, ksize);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:8702:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ins+ksize, split + x * ksize, rsize - x * ksize);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:8898:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(NODEPTR(mp, nkeys-1), NODEPTR(copy, nkeys-1),
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:9037:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *mc_wbuf[2];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:9038:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *mc_over[2];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:9215:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(NODEDATA(ni), &my->mc_next_pgno, sizeof(pgno_t));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:9226:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(mo, omp, my->mc_env->me_psize);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:9255:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(NODEDATA(ni), &db, sizeof(db));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:9831:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&txn->mt_dbs[slot], data.mv_data, sizeof(MDB_db));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:10082:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:10277:10:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
		need = MultiByteToWideChar(CP_UTF8, 0, src, -1, result, need);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb_dump.c:280:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(str, key.mv_data, key.mv_size);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb_load.c:75:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			version=atoi((char *)dbuf.mv_data+STRLENOF("VERSION="));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb_stat.c:235:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(str, key.mv_data, key.mv_size);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/midl.c:180:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ids[ids[0]+1], &app[1], app[0] * sizeof(MDB_ID));
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/midl.h:70:34:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define MDB_IDL_CPY( dst, src ) (memcpy( dst, src, MDB_IDL_SIZEOF( src ) ))
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sval[32] = "";
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest.c:60:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(sval, "%03x %d foo bar", values[i], values[i]);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest.c:91:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(sval, "%03x ", values[i]);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest2.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sval[32] = "";
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest2.c:63:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%03x %d foo bar", values[i], values[i]);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest2.c:90:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%03x ", values[i]);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest3.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sval[32];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest3.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char kval[sizeof(int)];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest3.c:68:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(kval, "%03x", values[i]);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest3.c:69:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%03x %d foo bar", values[i], values[i]);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest3.c:94:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(kval, "%03x", values[i & ~0x0f]);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest3.c:95:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%03x %d foo bar", values[i], values[i]);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest4.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sval[8];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest4.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char kval[sizeof(int)];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest4.c:64:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(kval, "001");
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest4.c:66:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%07x", values[i]);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest4.c:98:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(sval, "%07x", values[3]+1);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest4.c:103:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(sval, "%07x", values[255]+1);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest4.c:108:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(sval, "%07x", values[500]+1);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest4.c:130:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%07x", values[i]);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest5.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sval[32];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest5.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char kval[sizeof(int)];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest5.c:69:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(kval, "%03x", values[i]);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest5.c:70:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%03x %d foo bar", values[i], values[i]);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest5.c:96:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(kval, "%03x", values[i & ~0x0f]);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest5.c:97:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%03x %d foo bar", values[i], values[i]);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest6.c:27:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char dkbuf[1024];
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest6.c:64:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%08x", kval);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest6.c:71:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%08x", kval);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest6.c:78:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%08x", kval);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest6.c:100:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(kval, "%03x", values[i & ~0x0f]);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mtest6.c:101:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%03x %d foo bar", values[i], values[i]);
data/mozjs78-78.4.0/third_party/rust/lucet-runtime-internals/src/context/tests/c_child.c:7:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char output_string[1024];
data/mozjs78-78.4.0/third_party/rust/lucet-runtime/include/lucet_types.h:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fp[16];
data/mozjs78-78.4.0/third_party/rust/lucet-runtime/include/lucet_types.h:143:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char gp[8];
data/mozjs78-78.4.0/third_party/rust/lucet-runtime/include/lucet_types.h:151:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char file_name[LUCET_MODULE_ADDR_DETAILS_NAME_LEN];
data/mozjs78-78.4.0/third_party/rust/lucet-runtime/include/lucet_types.h:152:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sym_name[LUCET_MODULE_ADDR_DETAILS_NAME_LEN];
data/mozjs78-78.4.0/third_party/rust/lucet-runtime/include/lucet_types.h:193:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     as_untyped[8];
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/examples/pseudoquine.c:6:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *self = fopen("/examples/pseudoquine.c", "r");
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/cant_dotdot.c:7:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file = fopen("/sandbox/../outside.txt", "r");
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/follow_symlink.c:6:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file = fopen("/sandbox/subdir2/input_link.txt", "r");
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/fs.c:18:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            buf[4];
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/fs.c:26:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open("/sandbox/testfile", O_CREAT | O_RDWR, 0644);
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/fs.c:120:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open("/sandbox/testfile2", O_RDONLY);
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/getentropy.c:6:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256] = { 0 };
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/read_file.c:6:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file = fopen("/sandbox/input.txt", "r");
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/read_file_twice.c:7:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FILE *file = fopen("/sandbox/input.txt", "r");
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/stat.c:24:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(PATH, O_CREAT | O_WRONLY, 0666);
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/stdin.c:5:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char x[32];
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/symlink_escape.c:7:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file = fopen("/sandbox/subdir/outside.txt", "r");
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/symlink_loop.c:7:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file = fopen("/sandbox/subdir1/loop1", "r");
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/write_file.c:9:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file = fopen("/sandbox/output.txt", "w");
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/main.cpp:218:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *file = fopen(path, "rb");
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/main.cpp:239:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *file = fopen(path, "w");
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_common.hpp:241:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_common.hpp:247:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(buf, ".0");
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_common.hpp:255:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_common.hpp:261:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(buf, ".0");
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_containers.hpp:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char aligned_char[sizeof(T) * N];
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_containers.hpp:71:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	alignas(T) char aligned_char[sizeof(T) * N];
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_containers.hpp:698:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char stack_buffer[StackSize];
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_containers.hpp:708:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(current_buffer.buffer + current_buffer.offset, s, avail);
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_containers.hpp:720:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(current_buffer.buffer, s, len);
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_containers.hpp:726:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(current_buffer.buffer + current_buffer.offset, s, len);
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_glsl.cpp:291:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char *const swizzle[4][4] = {
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_glsl.cpp:3897:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char print_buffer[32];
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_glsl.cpp:3898:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(print_buffer, "0x%xu", c.scalar(col, row));
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_glsl.cpp:3963:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char print_buffer[64];
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_hlsl.cpp:1428:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static const char *types[QueryTypeCount] = { "float4", "int4", "uint4" };
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_hlsl.cpp:1429:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static const char *dims[QueryDimCount] = { "Texture1D",   "Texture1DArray",  "Texture2D",   "Texture2DArray",
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_hlsl.cpp:1435:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static const char *ret_types[QueryDimCount] = {
data/mozjs78-78.4.0/tools/fuzzing/interface/FuzzingInterface.h:50:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    is.open(testFile, std::ios::binary);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerCrossOver.cpp:38:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(Out + OutPos, Data + *InPos, ExtraSize);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerDataFlowTrace.cpp:60:23:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      size_t N = std::atol(L.c_str() + 1);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerDictionary.h:30:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(Data, B, S);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIO.cpp:66:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *Out = fopen(Path.c_str(), "w");
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIOPosix.cpp:125:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* Temp = fopen("/dev/null", "w");
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIOPosix.cpp:138:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(Tmp, FileName.c_str(), FileName.size() + 1);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIOWindows.cpp:223:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* Temp = fopen("nul", "w");
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerLoop.cpp:519:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(DataCopy, Data, Size);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerLoop.cpp:523:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(CurrentUnitData, Data, Size);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerLoop.cpp:647:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(CurrentUnitData, U.data(), Size);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerLoop.cpp:835:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(CurrentUnitData, U.data(), U.size());
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerMutate.cpp:88:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(Data, U.data(), NewSize);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerMutate.cpp:176:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(Data + Idx, W.data(), W.size());
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerMutate.cpp:181:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(Data + Idx, W.data(), W.size());
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerMutate.cpp:327:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(MutateInPlaceHere.data(), From + FromBeg, CopySize);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerMutate.cpp:403:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(Data + Off, &Val, sizeof(Val));
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerMutate.cpp:447:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(Data, U.data(), NewSize);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerSHA1.cpp:206:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(Out, sha1_result(&s), HASH_LENGTH);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerTracePC.cpp:253:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ModulePathRaw[4096] = "";  // What's PATH_MAX in portable C++?
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtil.cpp:188:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char PcDescr[1024] = {};
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtilFuchsia.cpp:376:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  std::unique_ptr<const char *[]> Argv(new const char *[Argc + 1]);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtilFuchsia.cpp:392:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FdOut = open(Path.c_str(), O_WRONLY | O_CREAT | O_TRUNC, 0);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtilFuchsia.cpp:438:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ErrorMsg[FDIO_SPAWN_ERR_MSG_MAX_LENGTH];
data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/JSONFormatter.cpp:66:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Length += strlen(Name) + 3 + strlen(Value) + 2 + 1;
data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/JSONFormatter.cpp:66:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Length += strlen(Name) + 3 + strlen(Value) + 2 + 1;
data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/JSONFormatter.cpp:73:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Length += strlen(Name) + 3 + Escaped.length() + 2 + 1;
data/mozjs78-78.4.0/build/clang-plugin/mozsearch-plugin/JSONFormatter.cpp:89:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Length += strlen(Name) + 3 + 2;
data/mozjs78-78.4.0/build/unix/elfhack/elf.cpp:116:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  file.read(e_ident, sizeof(e_ident));
data/mozjs78-78.4.0/build/unix/elfhack/elf.cpp:514:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    file->read(data, shdr.sh_size);
data/mozjs78-78.4.0/build/unix/elfhack/elf.cpp:897:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(string) + 1;
data/mozjs78-78.4.0/build/unix/elfhack/elfxx.h:227:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      file.read((char*)&e, sizeof(e));
data/mozjs78-78.4.0/build/unix/elfhack/elfxx.h:232:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      file.read((char*)&e, sizeof(e));
data/mozjs78-78.4.0/config/nsinstall.c:61:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          program, (int)strlen(program), "");
data/mozjs78-78.4.0/config/nsinstall.c:72:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l = strlen(path);
data/mozjs78-78.4.0/config/nsinstall.c:144:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ((cc = read(fromfd, bp, sizeof buf)) > 0) {
data/mozjs78-78.4.0/config/nsinstall.c:194:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  destdir = xmalloc((unsigned int)(strlen(to) + 1 + strlen(base) + 1));
data/mozjs78-78.4.0/config/nsinstall.c:194:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  destdir = xmalloc((unsigned int)(strlen(to) + 1 + strlen(base) + 1));
data/mozjs78-78.4.0/config/nsinstall.c:256:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        lplen = strlen(linkprefix);
data/mozjs78-78.4.0/config/nsinstall.c:317:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  tdlen = strlen(todir);
data/mozjs78-78.4.0/config/nsinstall.c:319:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  tdlen = strlen(todir);
data/mozjs78-78.4.0/config/nsinstall.c:326:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(name);
data/mozjs78-78.4.0/config/nsinstall.c:328:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bnlen = strlen(base);
data/mozjs78-78.4.0/config/nsinstall.c:370:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          len = strlen(linkname);
data/mozjs78-78.4.0/config/pathsub.c:108:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
char* xstrdup(char* s) { return strcpy(xmalloc(strlen(s) + 1), s); }
data/mozjs78-78.4.0/config/pathsub.c:133:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(strcpy(outpath, to));
data/mozjs78-78.4.0/config/pathsub.c:146:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len += strlen(outpath + len);
data/mozjs78-78.4.0/config/pathsub.c:164:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(name);
data/mozjs78-78.4.0/config/pathsub.c:172:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(cp, "../", 3);
data/mozjs78-78.4.0/intl/icu/source/common/cstring.h:37:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define uprv_strlen(str) U_STANDARD_CPP_NAMESPACE strlen(str)
data/mozjs78-78.4.0/intl/icu/source/common/cstring.h:43:63:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#define uprv_strncpy(dst, src, size) U_STANDARD_CPP_NAMESPACE strncpy(dst, src, size)
data/mozjs78-78.4.0/intl/icu/source/common/cstring.h:45:60:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
#define uprv_strncat(dst, src, n) U_STANDARD_CPP_NAMESPACE strncat(dst, src, n)
data/mozjs78-78.4.0/intl/icu/source/common/cwchar.h:43:24:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#   define uprv_wcslen wcslen
data/mozjs78-78.4.0/intl/icu/source/common/icuplug.cpp:788:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    DBG((stderr, "pluginfile= %s len %d/%d\n", plugin_file, (int)strlen(plugin_file), (int)sizeof(plugin_file)));
data/mozjs78-78.4.0/intl/icu/source/common/icuplug.cpp:847:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            p = config+strlen(config);
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:2072:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(codepage, nl_langinfo(CODESET),63-strlen(UCNV_SWAP_LFNL_OPTION_STRING));
data/mozjs78-78.4.0/intl/icu/source/common/putil.cpp:2072:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strncpy(codepage, nl_langinfo(CODESET),63-strlen(UCNV_SWAP_LFNL_OPTION_STRING));
data/mozjs78-78.4.0/intl/icu/source/common/stringtriebuilder.cpp:484:62:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        if(units[i]!=o.units[i] || values[i]!=o.values[i] || equal[i]!=o.equal[i]) {
data/mozjs78-78.4.0/intl/icu/source/common/stringtriebuilder.cpp:484:74:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        if(units[i]!=o.units[i] || values[i]!=o.values[i] || equal[i]!=o.equal[i]) {
data/mozjs78-78.4.0/intl/icu/source/common/stringtriebuilder.cpp:498:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
            Node *edge=equal[--i];
data/mozjs78-78.4.0/intl/icu/source/common/stringtriebuilder.cpp:517:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    Node *rightEdge=equal[unitNumber];
data/mozjs78-78.4.0/intl/icu/source/common/stringtriebuilder.cpp:521:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        if(equal[unitNumber]!=NULL) {
data/mozjs78-78.4.0/intl/icu/source/common/stringtriebuilder.cpp:522:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
            equal[unitNumber]->writeUnlessInsideRightEdge(firstEdgeNumber, rightEdgeNumber, builder);
data/mozjs78-78.4.0/intl/icu/source/common/stringtriebuilder.cpp:538:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        if(equal[unitNumber]==NULL) {
data/mozjs78-78.4.0/intl/icu/source/common/stringtriebuilder.cpp:544:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
            U_ASSERT(equal[unitNumber]->getOffset()>0);
data/mozjs78-78.4.0/intl/icu/source/common/stringtriebuilder.cpp:545:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
            value=offset-equal[unitNumber]->getOffset();
data/mozjs78-78.4.0/intl/icu/source/common/ucnv_lmb.cpp:552:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if (uprv_strncmp(pTable->LocaleID, LocaleID, strlen(pTable->LocaleID)) == 0)
data/mozjs78-78.4.0/intl/icu/source/common/unicode/stringtriebuilder.h:350:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
            equal[length]=NULL;
data/mozjs78-78.4.0/intl/icu/source/common/unicode/stringtriebuilder.h:358:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
            equal[length]=node;
data/mozjs78-78.4.0/intl/icu/source/common/unicode/stringtriebuilder.h:364:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        Node *equal[kMaxBranchLinearSubNodeLength];  // NULL means "has final value".
data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uwmsg.c:256:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        msg = (UChar*)malloc((strlen(textMsg)+1)*sizeof(msg[0]));
data/mozjs78-78.4.0/intl/icu/source/extra/uconv/uwmsg.c:257:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        u_charsToUChars(textMsg, msg, (int32_t)(strlen(textMsg)+1));
data/mozjs78-78.4.0/intl/icu/source/i18n/collationdatareader.cpp:47:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
CollationDataReader::read(const CollationTailoring *base, const uint8_t *inBytes, int32_t inLength,
data/mozjs78-78.4.0/intl/icu/source/i18n/collationdatareader.h:102:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    static void read(const CollationTailoring *base, const uint8_t *inBytes, int32_t inLength,
data/mozjs78-78.4.0/intl/icu/source/i18n/collationroot.cpp:63:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    CollationDataReader::read(NULL, inBytes, udata_getLength(t->memory), *t, errorCode);
data/mozjs78-78.4.0/intl/icu/source/i18n/decNumber.cpp:3665:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(string, "?");
data/mozjs78-78.4.0/intl/icu/source/i18n/decNumberLocal.h:158:27:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    #error Maximum digits mismatch
data/mozjs78-78.4.0/intl/icu/source/i18n/decNumberLocal.h:161:29:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    #error Maximum exponent mismatch
data/mozjs78-78.4.0/intl/icu/source/i18n/decNumberLocal.h:164:29:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    #error Minimum exponent mismatch
data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-utils.h:209:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(string);
data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-utils.h:302:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    DOUBLE_CONVERSION_ASSERT(static_cast<size_t>(n) <= strlen(s));
data/mozjs78-78.4.0/intl/icu/source/i18n/double-conversion-utils.h:322:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    DOUBLE_CONVERSION_ASSERT(strlen(buffer_.start()) == static_cast<size_t>(position_));
data/mozjs78-78.4.0/intl/icu/source/i18n/dtitvinf.cpp:178:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    return equal;
data/mozjs78-78.4.0/intl/icu/source/i18n/dtptngen.cpp:2101:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
       UBool equal;
data/mozjs78-78.4.0/intl/icu/source/i18n/dtptngen.cpp:2107:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
       if (equal) {
data/mozjs78-78.4.0/intl/icu/source/i18n/fmtable.cpp:327:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    return equal;
data/mozjs78-78.4.0/intl/icu/source/i18n/number_compact.cpp:161:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        auto magnitude = static_cast<int8_t> (strlen(key) - 1);
data/mozjs78-78.4.0/intl/icu/source/i18n/rulebasedcollator.cpp:178:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    CollationDataReader::read(base->tailoring, bin, length, *t, errorCode);
data/mozjs78-78.4.0/intl/icu/source/i18n/ucol_res.cpp:395:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    CollationDataReader::read(rootEntry->tailoring, inBytes, length, *t, errorCode);
data/mozjs78-78.4.0/intl/icu/source/i18n/vtzone.cpp:937:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    UChar read(void);
data/mozjs78-78.4.0/intl/icu/source/i18n/vtzone.cpp:952:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
VTZReader::read(void) {
data/mozjs78-78.4.0/intl/icu/source/i18n/vtzone.cpp:1282:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        UChar ch = reader.read();
data/mozjs78-78.4.0/intl/icu/source/i18n/windtfmt.cpp:331:54:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    appendTo.append((const UChar *)buffer, (int32_t) wcslen(buffer));
data/mozjs78-78.4.0/intl/icu/source/i18n/windtfmt.cpp:364:54:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    appendTo.append((const UChar *)buffer, (int32_t) wcslen(buffer));
data/mozjs78-78.4.0/intl/icu/source/i18n/winnmfmt.cpp:443:48:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    appendTo.append((UChar *)buffer, (int32_t) wcslen(buffer));
data/mozjs78-78.4.0/intl/icu/source/io/locbund.cpp:84:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = (int32_t)strlen(loc);
data/mozjs78-78.4.0/intl/icu/source/io/sprintf.cpp:181:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int32_t size = (int32_t)strlen(patternSpecification) + 1;
data/mozjs78-78.4.0/intl/icu/source/io/uprintf.cpp:174:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t size = strlen(patternSpecification) + 1;
data/mozjs78-78.4.0/intl/icu/source/io/uprntf_p.cpp:213:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        argSize = (int32_t)strlen(arg) + 1;
data/mozjs78-78.4.0/intl/icu/source/io/ustdio.cpp:715:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (dataSize > (count - read)) {
data/mozjs78-78.4.0/intl/icu/source/io/ustdio.cpp:716:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            dataSize = count - read;
data/mozjs78-78.4.0/intl/icu/source/io/ustdio.cpp:720:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        memcpy(chars + read, str->fPos, dataSize * sizeof(UChar));
data/mozjs78-78.4.0/intl/icu/source/io/ustdio.cpp:728:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while (dataSize != 0 && read < count);
data/mozjs78-78.4.0/intl/icu/source/io/ustdio.cpp:730:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return read;
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:143:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (((int)strlen(s2) >= n) && s2[n] != 0) {
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:163:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(n, name, *nameLen);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:168:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        *nameLen = (int)strlen(name);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:182:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy( newNode->name, name, nameLen );
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:423:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            int spaces = FLAG_INDENT - ((int)strlen(root->name) + depth);
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:690:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if((*pattern==0) || (pattern[strlen(pattern)-1]!='\n')) {
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:732:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if((*pattern==0) || (pattern[strlen(pattern)-1]!='\n')) {
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:782:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if((*pattern==0) || (pattern[strlen(pattern)-1]!='\n')) {
data/mozjs78-78.4.0/intl/icu/source/tools/ctestfw/ctest.c:1284:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *p = XML_PREFIX+strlen(XML_PREFIX);
data/mozjs78-78.4.0/intl/icu/source/tools/escapesrc/escapesrc.cpp:304:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      pos += strlen(newSeq) - 1;
data/mozjs78-78.4.0/intl/icu/source/tools/genbrk/genbrk.cpp:187:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    udata_writeBlock(pData, msg, strlen(msg));
data/mozjs78-78.4.0/intl/icu/source/tools/gencfu/gencfu.cpp:201:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    udata_writeBlock(pData, msg, strlen(msg));
data/mozjs78-78.4.0/intl/icu/source/tools/gendict/gendict.cpp:309:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    udata_writeBlock(pData, msg, strlen(msg));
data/mozjs78-78.4.0/intl/icu/source/tools/genrb/wrtxml.cpp:749:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        printAttribute("restype", integer_restype, (int32_t) strlen(integer_restype));
data/mozjs78-78.4.0/intl/icu/source/tools/gentest/genres32.c:59:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(file[strlen(file)-1]!=U_FILE_SEP_CHAR) {
data/mozjs78-78.4.0/intl/icu/source/tools/gentest/gentest.c:150:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        file[strlen(file)-1]!=U_FILE_SEP_CHAR) {
data/mozjs78-78.4.0/intl/icu/source/tools/icupkg/icupkg.cpp:246:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len=(int32_t)strlen(filename)-4; /* -4: subtract the length of ".dat" */
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:523:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int32_t len = static_cast<int32_t>(strlen(command));
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:2220:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (int32_t length = strlen(buf) - 1; length >= 0; length--) {
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgdata.cpp:2238:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buf[strlen(buf)] = 0;
data/mozjs78-78.4.0/intl/icu/source/tools/pkgdata/pkgtypes.c:232:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(aBuf, strAlias,(rPtr-strAlias));
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/filestrm.cpp:133:13:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int c = fgetc((FILE*)fileStream);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/filestrm.cpp:148:17:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int32_t c = fgetc((FILE*)fileStream);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:183:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len=(int32_t)strlen(basename)-4; /* -4: subtract the length of ".dat" */
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:257:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if((int32_t)(strlen(path)+1)>=capacity) {
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:273:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if((int32_t)((s-filename)+strlen(name))>=capacity) {
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:291:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sep=strchr(filename, 0)-strlen(name);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:436:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(strlen(p)>=sizeof(pkgPrefix)) {
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:613:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            int32_t inPkgNameLength= static_cast<int32_t>(strlen(inPkgName));
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:617:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if( (int32_t)strlen(s)>=(inPkgNameLength+2) &&
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:708:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        length=(int32_t)strlen(comment);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:772:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        prefixLength=(int32_t)strlen(prefix);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:774:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        prefixLength=(int32_t)strlen(pkgPrefix);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:800:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        length=(int32_t)strlen(items[i].name);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:951:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        findPrefixLength=(int32_t)strlen(pattern);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:956:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        findSuffixLength=(int32_t)strlen(findSuffix);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:983:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nameLength=(int32_t)strlen(name);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/package.cpp:1046:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        items[idx].name=allocString(TRUE, static_cast<int32_t>(strlen(name)));
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkg_genc.cpp:415:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(entry, "_");
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkgitems.cpp:147:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        idLength=(int32_t)strlen(id);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkgitems.cpp:149:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    suffixLength=(int32_t)strlen(suffix);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/pkgitems.cpp:533:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            baseNameLength=(int32_t)strlen(inBaseName);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/udbgutil.cpp:606:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( !strncmp(ticket, CLDR_TICKET_PREFIX, strlen(CLDR_TICKET_PREFIX)) ) {
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/udbgutil.cpp:608:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strcat( buf, ticket+strlen(CLDR_TICKET_PREFIX) );
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/unewdata.cpp:64:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    	length += static_cast<int32_t>(strlen(dir));
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/unewdata.cpp:67:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (dir[strlen(dir) - 1]!= U_FILE_SEP_CHAR) {
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/unewdata.cpp:71:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length += static_cast<int32_t>(strlen(name));		/* Add the filename length */
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/unewdata.cpp:74:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        length += static_cast<int32_t>(strlen(type));
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/unewdata.cpp:88:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *p=filename+strlen(dir);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/uparse.cpp:371:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sLen = (int32_t)strlen(source);
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/uparse.cpp:374:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while(read < source+sLen) {
data/mozjs78-78.4.0/intl/icu/source/tools/toolutil/uparse.cpp:375:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        sscanf(read, "%2x", &value);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/asctime.c:107:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		((strlen(year) <= 4) ? ASCTIME_FMT : ASCTIME_FMT_B),
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/asctime.c:112:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(result) < STD_ASCTIME_BUF_SIZE || buf == buf_asctime)
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/ialloc.c:16:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	newsize = (new == NULL) ? 0 : strlen(new);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/ialloc.c:21:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else	oldsize = strlen(old);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:309:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(cp) > TZ_ABBR_MAX_LEN &&
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:369:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ((strlen(p) + strlen(name) + 1) >= sizeof fullname)
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:369:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ((strlen(p) + strlen(name) + 1) >= sizeof fullname)
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:372:11:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
			(void) strcat(fullname, "/");
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:386:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	nread = read(fid, up->buf, sizeof up->buf);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:938:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		stdlen = strlen(name);	/* length of standard zone name */
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:1157:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	(void) strncpy(cp, stdname, stdlen);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:1161:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		(void) strncpy(cp, dstname, dstlen);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/localtime.c:1215:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lcl_is_set = strlen(name) < sizeof lcl_TZname;
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/scheck.c:23:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fbuf = malloc(2 * strlen(format) + 4);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tz2icu.cpp:245:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    file.read((char*)buf, 4);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tz2icu.cpp:263:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    file.read((char*)buf, 8);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tz2icu.cpp:279:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    file.read(&c, 1);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tz2icu.cpp:302:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    file.read(buf, 4);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tz2icu.cpp:307:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    file.read(buf, 1);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tz2icu.cpp:315:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    file.read(buf, 15);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tz2icu.cpp:353:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        file.read((char*) &c, 1);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tz2icu.cpp:409:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        file.read((char*) &c, 1);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/tz2icu.cpp:455:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        file.read(str, charcnt);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:519:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(argv[i]) > longest)
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:520:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			longest = strlen(argv[i]);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:562:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
				strcat(path, "/");
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:563:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				zstart = strlen(path);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:598:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			(void) strncpy(buf, abbr(&tm), (sizeof buf) - 1);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:620:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
							(void) strncpy(buf,
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:635:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
						(void) strncpy(buf,
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:745:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		(void) strncpy(loab, abbr(&lotm), (sizeof loab) - 1);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:940:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		(void) strncpy(loab, abbr(&lotm), (sizeof loab) - 1);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:1049:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(path, "/");
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:1059:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ((pzonename = malloc(strlen(relpath) + 1)) == NULL) {
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zdump.c:1085:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
				strcat(subpath, "/");
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:617:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	(void) umask(umask(S_IWGRP | S_IWOTH) | (S_IWGRP | S_IWOTH));
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:617:15:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	(void) umask(umask(S_IWGRP | S_IWOTH) | (S_IWGRP | S_IWOTH));
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:840:16:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			while ((c = getc(fp)) != EOF)
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1137:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (max_abbrvar_len < strlen(r.r_abbrvar))
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1138:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		max_abbrvar_len = strlen(r.r_abbrvar);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1227:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (max_format_len < strlen(z.z_format))
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1228:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		max_format_len = strlen(z.z_format);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1415:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ep = dp + strlen(dp) - 1;
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1687:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(directory) + 1 + strlen(name) + 1);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1687:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(directory) + 1 + strlen(name) + 1);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1851:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				thischarcnt += strlen(thisabbr) + 1;
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1859:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		(void) strncpy(tzh.tzh_magic, TZ_ICU_MAGIC, sizeof tzh.tzh_magic);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1861:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		(void) strncpy(tzh.tzh_magic, TZ_MAGIC, sizeof tzh.tzh_magic);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1962:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			(void) strncpy(abbr, format, slashp - format);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1971:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(abbr);
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:1999:10:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		(void) strcpy(result, "-");
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2075:10:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		(void) strcat(result, "/");
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2197:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	(void) strcat(result, ",");
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2205:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	(void) strcat(result, ",");
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2694:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		charcnt = strlen(chars) + 1;
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2836:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf = erealloc(buf, 132 + strlen(yitcommand) + strlen(type));
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2836:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf = erealloc(buf, 132 + strlen(yitcommand) + strlen(type));
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:2920:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	array = emalloc(size_product(strlen(cp) + 1, sizeof *array));
data/mozjs78-78.4.0/intl/icu/source/tools/tzcode/zic.c:3098:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i = strlen(string) + 1;
data/mozjs78-78.4.0/js/public/Equality.h:30:73:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                                        JS::Handle<JS::Value> v2, bool* equal);
data/mozjs78-78.4.0/js/public/Equality.h:40:72:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                                       JS::Handle<JS::Value> v2, bool* equal);
data/mozjs78-78.4.0/js/public/ErrorReport.h:139:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    message_ = JS::ConstUTF8CharsZ(messageArg, strlen(messageArg));
data/mozjs78-78.4.0/js/public/Principals.h:129:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    JSContext* cx, JSReadPrincipalsOp read);
data/mozjs78-78.4.0/js/public/StructuredClone.h:347:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ReadStructuredCloneOp read;
data/mozjs78-78.4.0/js/public/StructuredClone.h:679:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  bool read(JSContext* cx, JS::MutableHandleValue vp,
data/mozjs78-78.4.0/js/src/builtin/DataViewObject.cpp:326:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
bool DataViewObject::read(JSContext* cx, Handle<DataViewObject*> obj,
data/mozjs78-78.4.0/js/src/builtin/DataViewObject.cpp:488:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (!read(cx, thisView, args, &val)) {
data/mozjs78-78.4.0/js/src/builtin/DataViewObject.cpp:507:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (!read(cx, thisView, args, &val)) {
data/mozjs78-78.4.0/js/src/builtin/DataViewObject.cpp:526:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (!read(cx, thisView, args, &val)) {
data/mozjs78-78.4.0/js/src/builtin/DataViewObject.cpp:545:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (!read(cx, thisView, args, &val)) {
data/mozjs78-78.4.0/js/src/builtin/DataViewObject.cpp:564:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (!read(cx, thisView, args, &val)) {
data/mozjs78-78.4.0/js/src/builtin/DataViewObject.cpp:583:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (!read(cx, thisView, args, &val)) {
data/mozjs78-78.4.0/js/src/builtin/DataViewObject.cpp:604:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (!read(cx, thisView, args, &val)) {
data/mozjs78-78.4.0/js/src/builtin/DataViewObject.cpp:630:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (!read(cx, thisView, args, &val)) {
data/mozjs78-78.4.0/js/src/builtin/DataViewObject.cpp:654:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (!read(cx, thisView, args, &val)) {
data/mozjs78-78.4.0/js/src/builtin/DataViewObject.cpp:674:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (!read(cx, thisView, args, &val)) {
data/mozjs78-78.4.0/js/src/builtin/DataViewObject.h:155:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  static bool read(JSContext* cx, Handle<DataViewObject*> obj,
data/mozjs78-78.4.0/js/src/builtin/MapObject.cpp:103:17:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    b = BigInt::equal(value.toBigInt(), other.value.toBigInt());
data/mozjs78-78.4.0/js/src/builtin/Object.cpp:154:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(chars);
data/mozjs78-78.4.0/js/src/builtin/Object.cpp:692:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!sb.append("[object ") || !sb.append(className, strlen(className)) ||
data/mozjs78-78.4.0/js/src/builtin/Profilers.cpp:477:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      !strlen(getenv("MOZ_PROFILE_WITH_PERF"))) {
data/mozjs78-78.4.0/js/src/builtin/Profilers.cpp:543:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(500 * 1000);
data/mozjs78-78.4.0/js/src/builtin/ReflectParse.cpp:315:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      RootedAtom atom(cx, Atomize(cx, name, strlen(name)));
data/mozjs78-78.4.0/js/src/builtin/ReflectParse.cpp:400:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    RootedAtom atom(cx, Atomize(cx, s, strlen(s)));
data/mozjs78-78.4.0/js/src/builtin/ReflectParse.cpp:479:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    RootedAtom atom(cx, Atomize(cx, name, strlen(name)));
data/mozjs78-78.4.0/js/src/builtin/String.cpp:519:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      !sb.append(quoted.get(), strlen(quoted.get())) || !sb.append("))")) {
data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.cpp:817:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(buf, ",");
data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.cpp:823:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(buf, ",");
data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.cpp:917:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(lastAnalysisResult, v, sizeof(lastAnalysisResult));
data/mozjs78-78.4.0/js/src/builtin/TestingFunctions.cpp:3815:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JS::ConstUTF8CharsZ utf8chars(buf.get(), strlen(buf.get()));
data/mozjs78-78.4.0/js/src/builtin/TypedObject.cpp:1325:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  RootedAtom className(cx, Atomize(cx, name, strlen(name)));
data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTag.cpp:288:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t variantLength = strlen(variantChars);
data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTag.cpp:391:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t extensionLength = strlen(extensionChars);
data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTag.cpp:421:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t privateuseLength = strlen(privateuse);
data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTag.cpp:454:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(extension);
data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTag.cpp:569:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t TrueLength = strlen(True);
data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTag.cpp:674:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    MOZ_ASSERT(strlen(subtag) > 0);
data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTag.cpp:675:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return sb.append(subtag, strlen(subtag));
data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTag.cpp:748:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(extension);
data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTag.cpp:844:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!sb.append(replacement, strlen(replacement))) {
data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTag.cpp:967:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t length = strlen(und);
data/mozjs78-78.4.0/js/src/builtin/intl/LanguageTag.h:344:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   {privateuse.get(), strlen(privateuse.get())}));
data/mozjs78-78.4.0/js/src/builtin/intl/Locale.cpp:72:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    baseNameLength += 1 + strlen(variant.get());
data/mozjs78-78.4.0/js/src/builtin/intl/Locale.cpp:97:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t extensionLength = strlen(extension.get());
data/mozjs78-78.4.0/js/src/builtin/intl/Locale.cpp:383:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    unicodeExtensionEnd = unicodeExtension + strlen(unicodeExtension);
data/mozjs78-78.4.0/js/src/builtin/intl/Locale.cpp:720:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    if (std::equal(beginKey, beginKey + UnicodeKeyLength, key)) {
data/mozjs78-78.4.0/js/src/builtin/intl/Locale.cpp:1388:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  MOZ_ASSERT(strlen(unicodeTypeChars.get()) == unicodeTypeLength);
data/mozjs78-78.4.0/js/src/builtin/intl/NumberFormat.cpp:292:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      unitAtom = Atomize(cx, unitIdentifier, strlen(unitIdentifier));
data/mozjs78-78.4.0/js/src/builtin/intl/NumberFormat.cpp:367:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return append(unit.type, strlen(unit.type)) && append('-') &&
data/mozjs78-78.4.0/js/src/builtin/intl/NumberFormat.cpp:368:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           append(unit.name, strlen(unit.name));
data/mozjs78-78.4.0/js/src/builtin/intl/NumberFormat.cpp:383:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    auto& denominator = FindSimpleMeasureUnit(p + strlen(separator));
data/mozjs78-78.4.0/js/src/builtin/intl/SharedIntlData.cpp:175:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    timeZone = Atomize(cx, rawTimeZone, strlen(rawTimeZone));
data/mozjs78-78.4.0/js/src/builtin/intl/SharedIntlData.cpp:200:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    linkName = Atomize(cx, rawLinkName, strlen(rawLinkName));
data/mozjs78-78.4.0/js/src/builtin/intl/SharedIntlData.cpp:206:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    target = Atomize(cx, rawTarget, strlen(rawTarget));
data/mozjs78-78.4.0/js/src/builtin/intl/SharedIntlData.cpp:349:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t length = strlen(locale);
data/mozjs78-78.4.0/js/src/builtin/intl/SharedIntlData.cpp:374:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    LocaleHasher::Lookup lookup(modernStyle, strlen(modernStyle));
data/mozjs78-78.4.0/js/src/builtin/intl/SharedIntlData.cpp:376:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!addLocale(oldStyle, strlen(oldStyle))) {
data/mozjs78-78.4.0/js/src/builtin/intl/SharedIntlData.cpp:390:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    LocaleHasher::Lookup lookup(lastDitchParent, strlen(lastDitchParent));
data/mozjs78-78.4.0/js/src/builtin/intl/SharedIntlData.cpp:396:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!addLocale(lastDitch, strlen(lastDitch))) {
data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStream.cpp:168:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  bool equal;
data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStream.cpp:169:57:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (!EqualStrings(cx, typeString, cx->names().bytes, &equal)) {
data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStream.cpp:172:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (equal) {
data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStream.cpp:317:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    bool equal;
data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStream.cpp:318:52:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    if (!EqualStrings(cx, mode, cx->names().byob, &equal)) {
data/mozjs78-78.4.0/js/src/builtin/streams/ReadableStream.cpp:321:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    if (!equal) {
data/mozjs78-78.4.0/js/src/ctypes/CTypes.cpp:4144:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!str || !result.append(str, strlen(str))) { \
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/closures.c:283:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t lendir = strlen (dir);
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/dlmalloc.c:656:32:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
#define dlmemalign             memalign
data/mozjs78-78.4.0/js/src/ctypes/libffi/src/dlmalloc.c:2528:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          read(fd, buf, sizeof(buf)) == sizeof(buf)) {
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/strlen.c:12:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return (strlen(s));
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/strlen2.c:13:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return (size_t) ((int) strlen(s) + (int) a);
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/strlen3.c:13:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return (size_t) ((int) strlen(s) + (int) a);
data/mozjs78-78.4.0/js/src/ctypes/libffi/testsuite/libffi.call/strlen4.c:13:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return (size_t) ((int) strlen(s) + (int) a + i);
data/mozjs78-78.4.0/js/src/debugger/Debugger.cpp:2116:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* atom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/debugger/Debugger.cpp:6454:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* atom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/debugger/Debugger.cpp:6690:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    JSAtom* atomized = Atomize(cx, strVal, strlen(strVal));
data/mozjs78-78.4.0/js/src/debugger/DebuggerMemory.cpp:233:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cx, Atomize(cx, entry.className, strlen(entry.className)));
data/mozjs78-78.4.0/js/src/debugger/Environment.cpp:194:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* str = Atomize(cx, s, strlen(s), PinAtom);
data/mozjs78-78.4.0/js/src/debugger/Environment.cpp:211:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    JSAtom* str = Atomize(cx, s, strlen(s), PinAtom);
data/mozjs78-78.4.0/js/src/debugger/Frame.cpp:1445:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* str = Atomize(cx, s, strlen(s));
data/mozjs78-78.4.0/js/src/debugger/Frame.cpp:1572:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        RootedAtom causeAtom(cx, AtomizeUTF8Chars(cx, cause, strlen(cause)));
data/mozjs78-78.4.0/js/src/debugger/Object.cpp:1707:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* str = Atomize(cx, className, strlen(className));
data/mozjs78-78.4.0/js/src/ds/LifoAlloc.h:939:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    T* read(size_t size = sizeof(T)) {
data/mozjs78-78.4.0/js/src/ds/LifoAlloc.h:940:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      return reinterpret_cast<T*>(read(size));
data/mozjs78-78.4.0/js/src/ds/LifoAlloc.h:946:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    void* read(size_t size) { return seekBaseAndAdvanceBy(size); }
data/mozjs78-78.4.0/js/src/ds/MemoryProtectionExceptionHandler.cpp:152:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  BOOL ret = WriteFile(GetStdHandle(STD_ERROR_HANDLE), aStr, strlen(aStr) + 1,
data/mozjs78-78.4.0/js/src/ds/MemoryProtectionExceptionHandler.cpp:157:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ssize_t ret = write(STDERR_FILENO, aStr, strlen(aStr) + 1);
data/mozjs78-78.4.0/js/src/editline/editline.c:206:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return read(0, &c, (SIZE_T)1) == 1 ? c : EOF;
data/mozjs78-78.4.0/js/src/editline/editline.c:432:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Point = -strlen(Prompt);
data/mozjs78-78.4.0/js/src/editline/editline.c:449:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen((char *)p);
data/mozjs78-78.4.0/js/src/editline/editline.c:604:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(pat);
data/mozjs78-78.4.0/js/src/editline/editline.c:938:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen((char *)Line))
data/mozjs78-78.4.0/js/src/editline/editline.h:94:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
extern int	strlen();
data/mozjs78-78.4.0/js/src/frontend/BinASTTokenReaderContext.h:1867:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    if (!std::equal(left.start_, left.start_ + left.byteLen_, right)) {
data/mozjs78-78.4.0/js/src/frontend/BinASTTokenReaderMultipart.h:371:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    if (!std::equal(left.start_, left.start_ + left.byteLen_, right)) {
data/mozjs78-78.4.0/js/src/frontend/FullParseHandler.h:1026:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           node->pn_pos.begin + strlen("async") == node->pn_pos.end &&
data/mozjs78-78.4.0/js/src/frontend/NameFunctions.cpp:68:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           buf_.append(source.get(), strlen(source.get())) && buf_.append(']');
data/mozjs78-78.4.0/js/src/frontend/ParseNode.cpp:215:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  indent += strlen(name) + 2;
data/mozjs78-78.4.0/js/src/frontend/ParseNode.cpp:239:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  indent += strlen(name) + 2;
data/mozjs78-78.4.0/js/src/frontend/ParseNode.cpp:249:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  indent += strlen(name) + 2;
data/mozjs78-78.4.0/js/src/frontend/ParseNode.cpp:261:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  indent += strlen(name) + 2;
data/mozjs78-78.4.0/js/src/frontend/ParseNode.cpp:269:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  indent += strlen(name) + 2;
data/mozjs78-78.4.0/js/src/frontend/ParseNode.cpp:278:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    indent += strlen(name) + 3;
data/mozjs78-78.4.0/js/src/frontend/ParseNode.cpp:348:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  indent += strlen(name) + atom()->length() + 3;
data/mozjs78-78.4.0/js/src/frontend/ParseNode.cpp:356:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nameIndent = indent + strlen(name) + 3;
data/mozjs78-78.4.0/js/src/frontend/SyntaxParseHandler.h:191:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (pos.begin + strlen("async") == pos.end && name == cx->names().async) {
data/mozjs78-78.4.0/js/src/frontend/TokenStream.cpp:642:21:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#  define fast_getc getc
data/mozjs78-78.4.0/js/src/fuzz-tests/testRegExp.cpp:56:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    inputLength = strlen(inputChars);
data/mozjs78-78.4.0/js/src/gc/Barrier.h:737:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  void read() const { InternalBarrierMethods<T>::readBarrier(this->value); }
data/mozjs78-78.4.0/js/src/gc/Barrier.h:788:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      this->read();
data/mozjs78-78.4.0/js/src/gc/GC.cpp:1111:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#  define ZEAL_MODE(name, value) {#  name, strlen(#  name), value},
data/mozjs78-78.4.0/js/src/gc/GC.cpp:1168:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  auto text = CharRange(str, strlen(str));
data/mozjs78-78.4.0/js/src/gc/GC.cpp:3535:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  Compartment** write = read;
data/mozjs78-78.4.0/js/src/gc/GC.cpp:3536:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while (read < end) {
data/mozjs78-78.4.0/js/src/gc/GC.cpp:3565:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  Realm** write = read;
data/mozjs78-78.4.0/js/src/gc/GC.cpp:3566:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while (read < end) {
data/mozjs78-78.4.0/js/src/gc/GC.cpp:3610:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  Zone** write = read;
data/mozjs78-78.4.0/js/src/gc/GC.cpp:3612:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while (read < end) {
data/mozjs78-78.4.0/js/src/gc/GC.cpp:8234:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nchars = strlen(cstr.get());
data/mozjs78-78.4.0/js/src/gc/GC.cpp:8248:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nchars = strlen(cstr.get());
data/mozjs78-78.4.0/js/src/gc/GC.cpp:8271:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nchars = strlen(cstr.get());
data/mozjs78-78.4.0/js/src/gc/NurseryAwareHashMap.h:46:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    this->read();
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:257:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t separatorLength = strlen(separator);
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:260:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length += fragments[i] ? strlen(fragments[i].get()) : 0;
data/mozjs78-78.4.0/js/src/gc/Statistics.cpp:277:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cursor += fragments[i] ? strlen(fragments[i].get()) : 0;
data/mozjs78-78.4.0/js/src/gc/StoreBuffer.cpp:51:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    unsigned size = *e.read<unsigned>();
data/mozjs78-78.4.0/js/src/gc/StoreBuffer.cpp:52:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    BufferableRef* edge = e.read<BufferableRef>(size);
data/mozjs78-78.4.0/js/src/gc/Tracer.cpp:286:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(name);
data/mozjs78-78.4.0/js/src/gc/Tracer.cpp:327:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          bool willFit = str->length() + strlen("<length > ") + strlen(header) +
data/mozjs78-78.4.0/js/src/gc/Tracer.cpp:327:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          bool willFit = str->length() + strlen("<length > ") + strlen(header) +
data/mozjs78-78.4.0/js/src/gdb/tests/test-unwind.cpp:67:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!srcBuf.init(cx, bytes, strlen(bytes), JS::SourceOwnership::Borrowed)) {
data/mozjs78-78.4.0/js/src/irregexp/RegExpEngine.cpp:547:69:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                                                   character_ranges[read]);
data/mozjs78-78.4.0/js/src/irregexp/RegExpEngine.cpp:549:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    } while (read < n);
data/mozjs78-78.4.0/js/src/jit/BaselineBailouts.cpp:710:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    Value v = iter.read();
data/mozjs78-78.4.0/js/src/jit/BaselineBailouts.cpp:766:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      returnValue = iter.read();
data/mozjs78-78.4.0/js/src/jit/BaselineBailouts.cpp:771:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      v = iter.read();
data/mozjs78-78.4.0/js/src/jit/BaselineBailouts.cpp:799:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    Value thisv = iter.read();
data/mozjs78-78.4.0/js/src/jit/BaselineBailouts.cpp:827:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      Value arg = iter.read();
data/mozjs78-78.4.0/js/src/jit/BaselineBailouts.cpp:847:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    Value slot = iter.read();
data/mozjs78-78.4.0/js/src/jit/BaselineBailouts.cpp:901:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      Value v = iter.read();
data/mozjs78-78.4.0/js/src/jit/BaselineBailouts.cpp:954:37:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        savedCallerArgs[i].set(iter.read());
data/mozjs78-78.4.0/js/src/jit/BaselineBailouts.cpp:1000:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        v = iter.read();
data/mozjs78-78.4.0/js/src/jit/BaselineBailouts.cpp:1006:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      v = iter.read();
data/mozjs78-78.4.0/js/src/jit/BaselineBailouts.cpp:1120:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      unsigned len = strlen(filename) + 200;
data/mozjs78-78.4.0/js/src/jit/IonBuilder.cpp:2672:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (!equal && !notEqual) {
data/mozjs78-78.4.0/js/src/jit/IonScript.h:484:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* ncode = js_pod_malloc<char>(strlen(code) + 1);
data/mozjs78-78.4.0/js/src/jit/JSJitFrameIter.h:428:65:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  uintptr_t fromRegister(Register reg) const { return machine_->read(reg); }
data/mozjs78-78.4.0/js/src/jit/JSJitFrameIter.h:431:67:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  double fromRegister(FloatRegister reg) const { return machine_->read(reg); }
data/mozjs78-78.4.0/js/src/jit/JSJitFrameIter.h:538:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  Value read() { return allocationValue(readAllocation()); }
data/mozjs78-78.4.0/js/src/jit/JSJitFrameIter.h:570:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        Value v = read();
data/mozjs78-78.4.0/js/src/jit/JitFrames.cpp:119:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RootedValue doneValue(cx, si.read());
data/mozjs78-78.4.0/js/src/jit/JitFrames.cpp:796:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return frame.machineState().read(reg);
data/mozjs78-78.4.0/js/src/jit/JitSpewer.cpp:112:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t filelen = strlen(filename);
data/mozjs78-78.4.0/js/src/jit/JitSpewer.cpp:400:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return strlen(found) == strlen(flag) && strcmp(found, flag) == 0;
data/mozjs78-78.4.0/js/src/jit/JitSpewer.cpp:400:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return strlen(found) == strlen(flag) && strcmp(found, flag) == 0;
data/mozjs78-78.4.0/js/src/jit/LIR.cpp:335:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name);
data/mozjs78-78.4.0/js/src/jit/MIR.cpp:82:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name);
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:154:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue operand(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:174:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue lhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:175:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue rhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:196:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue lhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:197:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue rhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:218:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue lhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:219:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue rhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:239:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue lhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:240:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue rhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:261:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue lhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:262:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue rhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:283:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue lhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:284:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue rhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:309:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue operand(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:343:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue lhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:344:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue rhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:374:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue lhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:375:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue rhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:408:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue lhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:409:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue rhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:445:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue lhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:446:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue rhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:472:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue lhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:473:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue rhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:494:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue v(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:512:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue lhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:513:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue rhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:528:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue operand(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:572:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue v(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:592:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue v(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:612:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue arg(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:631:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue arg(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:650:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedString lhs(cx, iter.read().toString());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:651:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue rhs(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:671:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue operand(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:692:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue base(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:693:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue power(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:714:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue base(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:738:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue a(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:739:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue b(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:759:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue v(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:782:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue num(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:809:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue y(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:810:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue x(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:837:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    vec.infallibleAppend(iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:882:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue arg(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:925:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      RootedValue arg(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:936:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      RootedValue arg(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:973:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedString str(cx, iter.read().toString());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:974:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedString sep(cx, iter.read().toString());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1000:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue v(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1024:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedObject regexp(cx, &iter.read().toObject());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1025:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedString input(cx, iter.read().toString());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1026:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int32_t lastIndex = iter.read().toInt32();
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1046:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedObject regexp(cx, &iter.read().toObject());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1047:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedString input(cx, iter.read().toString());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1048:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int32_t lastIndex = iter.read().toInt32();
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1070:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedString string(cx, iter.read().toString());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1071:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedObject regexp(cx, &iter.read().toObject());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1072:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int32_t lastIndex = iter.read().toInt32();
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1094:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue v(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1110:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue v(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1135:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue v(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1156:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue value(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1182:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedObject templateObject(cx, &iter.read().toObject());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1215:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedObject templateObject(cx, &iter.read().toObject());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1244:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedObject templateObject(cx, &iter.read().toObject());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1270:42:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                                   &iter.read().toObject().as<ArrayObject>());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1295:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedObject templateObject(cx, &iter.read().toObject());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1331:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedObject templateObject(cx, &iter.read().toObject());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1354:37:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedObject scopeChain(cx, &iter.read().toObject());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1355:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedFunction fun(cx, &iter.read().toObject().as<JSFunction>());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1377:37:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedObject scopeChain(cx, &iter.read().toObject());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1378:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue newTarget(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1379:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedFunction fun(cx, &iter.read().toObject().as<JSFunction>());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1401:37:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedObject scopeChain(cx, &iter.read().toObject());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1402:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedObject prototype(cx, &iter.read().toObject());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1403:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedFunction fun(cx, &iter.read().toObject().as<JSFunction>());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1426:45:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  Rooted<CallObject*> templateObj(cx, &iter.read().toObject().as<CallObject>());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1453:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedObject object(cx, &iter.read().toObject());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1459:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    val = iter.read();
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1481:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ArrayObject* object = &iter.read().toObject().as<ArrayObject>();
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1482:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  uint32_t initLength = iter.read().toInt32();
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1490:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      Value val = iter.read();
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1504:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      Value val = iter.read();
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1533:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedArrayObject obj(cx, &iter.read().toObject().as<ArrayObject>());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1534:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue len(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1563:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  iter.read();  // skip the unused operand.
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1581:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedString string(cx, iter.read().toString());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1582:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedString pattern(cx, iter.read().toString());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1583:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedString replace(cx, iter.read().toString());
data/mozjs78-78.4.0/js/src/jit/Recover.cpp:1607:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  RootedValue operand(cx, iter.read());
data/mozjs78-78.4.0/js/src/jit/Registers.h:263:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  uintptr_t read(Register reg) const { return regs_[reg.code()]->r; }
data/mozjs78-78.4.0/js/src/jit/Registers.h:264:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  double read(FloatRegister reg) const { return fpregs_[reg.code()]->d; }
data/mozjs78-78.4.0/js/src/jit/Snapshots.cpp:264:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
RValueAllocation RValueAllocation::read(CompactBufferReader& reader) {
data/mozjs78-78.4.0/js/src/jit/Snapshots.cpp:492:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return RValueAllocation::read(allocReader_);
data/mozjs78-78.4.0/js/src/jit/Snapshots.h:282:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  static RValueAllocation read(CompactBufferReader& reader);
data/mozjs78-78.4.0/js/src/jit/VMFunctions.cpp:2035:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  bool res = BigInt::equal(x, y);
data/mozjs78-78.4.0/js/src/jit/VMFunctions.cpp:2062:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  bool res = BigInt::equal(x, y);
data/mozjs78-78.4.0/js/src/jit/VMFunctions.cpp:2105:48:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  JS_TRY_VAR_OR_RETURN_FALSE(cx, *res, BigInt::equal(cx, x, y));
data/mozjs78-78.4.0/js/src/jit/arm/Architecture-arm.cpp:230:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while (read(fd, &aux, sizeof(aux))) {
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:537:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  bool read() {
data/mozjs78-78.4.0/js/src/jit/arm/Assembler-arm.cpp:683:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while (iter.read()) {
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:2263:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  Label nan, equal, returnSecond, done;
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:2272:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ma_b(&equal, Assembler::VFP_Equal);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:2277:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  bind(&equal);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:2310:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  Label nan, equal, returnSecond, done;
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:2319:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ma_b(&equal, Assembler::VFP_Equal);
data/mozjs78-78.4.0/js/src/jit/arm/MacroAssembler-arm.cpp:2324:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  bind(&equal);
data/mozjs78-78.4.0/js/src/jit/arm/Simulator-arm.cpp:593:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(line_buf);
data/mozjs78-78.4.0/js/src/jit/arm/disasm/Disasm-arm.cpp:134:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (strncmp(string, compare_string, strlen(compare_string)) == 0)
data/mozjs78-78.4.0/js/src/jit/arm64/Assembler-arm64.cpp:464:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  bool read() {
data/mozjs78-78.4.0/js/src/jit/arm64/Assembler-arm64.cpp:539:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while (iter.read()) {
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Debugger-vixl.cpp:138:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t size = strlen(name) + 1;
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Debugger-vixl.cpp:140:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(value_, name, size);
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Debugger-vixl.cpp:246:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t size = strlen(arg) + 1;
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Debugger-vixl.cpp:248:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(unknown_, arg, size);
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Debugger-vixl.cpp:905:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(arg) < 2) {
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Debugger-vixl.cpp:983:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((strlen(arg) < 3) || (arg[0] != '0') || (arg[1] != 'x')) {
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Debugger-vixl.cpp:1013:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(arg);
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3087:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          return strlen("IVByElemIndex");
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3090:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (strncmp(format, "IVInsIndex", strlen("IVInsIndex")) == 0) {
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3097:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strncmp(format, "IVInsIndex1", strlen("IVInsIndex1")) == 0) {
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3099:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              return strlen("IVInsIndex1");
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3101:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       strlen("IVInsIndex2")) == 0) {
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3103:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              return strlen("IVInsIndex2");
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3118:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      strlen("IVMIImmFPSingle")) == 0) {
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3121:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            return strlen("IVMIImmFPSingle");
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3124:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                             strlen("IVMIImmFPDouble")) == 0) {
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3127:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            return strlen("IVMIImmFPDouble");
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3128:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          } else if (strncmp(format, "IVMIImm8", strlen("IVMIImm8")) == 0) {
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3131:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            return strlen("IVMIImm8");
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3132:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          } else if (strncmp(format, "IVMIImm", strlen("IVMIImm")) == 0) {
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3141:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            return strlen("IVMIImm");
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3143:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                             strlen("IVMIShiftAmt1")) == 0) {
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3147:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            return strlen("IVMIShiftAmt1");
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3149:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                             strlen("IVMIShiftAmt2")) == 0) {
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Disasm-vixl.cpp:3153:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            return strlen("IVMIShiftAmt2");
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Instrument-vixl.cpp:36:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(name_, name, kCounterNameMaxLength);
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/MacroAssembler-vixl.cpp:1800:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  VIXL_ASSERT(strlen(marker_name) == 2);
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-vixl.cpp:468:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      padding_chars -= strlen(suffix);
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-vixl.cpp:473:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      padding_chars -= strlen(suffix);
data/mozjs78-78.4.0/js/src/jit/arm64/vixl/Simulator-vixl.cpp:3917:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(format_base) + 1;
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1243:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  Label nan, equal, done;
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1256:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ma_bc1d(first, second, &equal, Assembler::DoubleEqual, ShortJump);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1263:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  bind(&equal);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1296:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  Label nan, equal, done;
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1309:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  ma_bc1s(first, second, &equal, Assembler::DoubleEqual, ShortJump);
data/mozjs78-78.4.0/js/src/jit/mips-shared/MacroAssembler-mips-shared.cpp:1316:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  bind(&equal);
data/mozjs78-78.4.0/js/src/jit/mips32/Simulator-mips32.cpp:695:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(lineBuf);
data/mozjs78-78.4.0/js/src/jit/mips64/Simulator-mips64.cpp:728:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(lineBuf);
data/mozjs78-78.4.0/js/src/jit/shared/Disassembler-shared.cpp:72:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (sizeof(fmt2) >= strlen(fmt) + sizeof(prefix_fmt)) {
data/mozjs78-78.4.0/js/src/jit/x64/Assembler-x64.cpp:237:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  bool read() {
data/mozjs78-78.4.0/js/src/jit/x64/Assembler-x64.cpp:268:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while (iter.read()) {
data/mozjs78-78.4.0/js/src/jit/x86/Assembler-x86.cpp:61:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  bool read() {
data/mozjs78-78.4.0/js/src/jit/x86/Assembler-x86.cpp:80:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while (iter.read()) {
data/mozjs78-78.4.0/js/src/jsapi-tests/testBinASTReader.cpp:81:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  MOZ_ASSERT(strlen(gJsDirectory) == 0);
data/mozjs78-78.4.0/js/src/jsapi-tests/testBinASTReader.cpp:116:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  MOZ_ASSERT(strlen(gJsDirectory) > 0);
data/mozjs78-78.4.0/js/src/jsapi-tests/testBinASTReader.cpp:193:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!path_.append(path, strlen(path))) {
data/mozjs78-78.4.0/js/src/jsapi-tests/testBinASTReader.cpp:213:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!path_.append(component, strlen(component))) {
data/mozjs78-78.4.0/js/src/jsapi-tests/testBinASTReader.cpp:281:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t namlen = strlen(d_name);
data/mozjs78-78.4.0/js/src/jsapi-tests/testCallArgs.cpp:33:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  CHECK(srcBuf.init(cx, code, strlen(code), JS::SourceOwnership::Borrowed));
data/mozjs78-78.4.0/js/src/jsapi-tests/testCompileUtf8.cpp:139:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return std::strncmp(prefix, str, strlen(prefix)) == 0;
data/mozjs78-78.4.0/js/src/jsapi-tests/testEmptyWindowIsOmitted.cpp:82:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return std::strncmp(prefix, str, strlen(prefix)) == 0;
data/mozjs78-78.4.0/js/src/jsapi-tests/testGCAllocator.cpp:246:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = strlen(str);
data/mozjs78-78.4.0/js/src/jsapi-tests/testGCCellPtr.cpp:29:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  CHECK(srcBuf.init(cx, code, strlen(code), JS::SourceOwnership::Borrowed));
data/mozjs78-78.4.0/js/src/jsapi-tests/testGCOutOfMemory.cpp:28:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  CHECK(srcBuf.init(cx, source, strlen(source), JS::SourceOwnership::Borrowed));
data/mozjs78-78.4.0/js/src/jsapi-tests/testHashTable.cpp:83:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  return equal;
data/mozjs78-78.4.0/js/src/jsapi-tests/testHashTable.cpp:105:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  return equal;
data/mozjs78-78.4.0/js/src/jsapi-tests/testJitRValueAlloc.cpp:26:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return RValueAllocation::read(reader);
data/mozjs78-78.4.0/js/src/jsapi-tests/testLooselyEqual.cpp:17:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    bool equal;
data/mozjs78-78.4.0/js/src/jsapi-tests/testLooselyEqual.cpp:18:39:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    CHECK(JS::LooselyEqual(cx, x, y, &equal) && equal);
data/mozjs78-78.4.0/js/src/jsapi-tests/testLooselyEqual.cpp:18:49:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    CHECK(JS::LooselyEqual(cx, x, y, &equal) && equal);
data/mozjs78-78.4.0/js/src/jsapi-tests/testLooselyEqual.cpp:19:39:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    CHECK(JS::LooselyEqual(cx, y, x, &equal) && equal);
data/mozjs78-78.4.0/js/src/jsapi-tests/testLooselyEqual.cpp:19:49:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    CHECK(JS::LooselyEqual(cx, y, x, &equal) && equal);
data/mozjs78-78.4.0/js/src/jsapi-tests/testLooselyEqual.cpp:24:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    bool equal;
data/mozjs78-78.4.0/js/src/jsapi-tests/testLooselyEqual.cpp:25:39:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    CHECK(JS::LooselyEqual(cx, x, y, &equal) && !equal);
data/mozjs78-78.4.0/js/src/jsapi-tests/testLooselyEqual.cpp:25:50:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    CHECK(JS::LooselyEqual(cx, x, y, &equal) && !equal);
data/mozjs78-78.4.0/js/src/jsapi-tests/testLooselyEqual.cpp:26:39:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    CHECK(JS::LooselyEqual(cx, y, x, &equal) && !equal);
data/mozjs78-78.4.0/js/src/jsapi-tests/testLooselyEqual.cpp:26:50:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    CHECK(JS::LooselyEqual(cx, y, x, &equal) && !equal);
data/mozjs78-78.4.0/js/src/jsapi-tests/testMappedArrayBuffer.cpp:141:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  CHECK(cloned_buffer.read(cx, &v2, JS::CloneDataPolicy(), nullptr, nullptr));
data/mozjs78-78.4.0/js/src/jsapi-tests/testMappedArrayBuffer.cpp:180:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  CHECK(cloned_buffer.read(cx, &v2, policy, nullptr, nullptr));
data/mozjs78-78.4.0/js/src/jsapi-tests/testMutedErrors.cpp:46:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(asciiChars);
data/mozjs78-78.4.0/js/src/jsapi-tests/testParseJSON.cpp:40:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length_ = strlen(str);
data/mozjs78-78.4.0/js/src/jsapi-tests/testScriptSourceCompression.cpp:175:17:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    return std::equal(chars, chars + FunctionNameOffset, FunctionStart) &&
data/mozjs78-78.4.0/js/src/jsapi-tests/testScriptSourceCompression.cpp:177:17:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
           std::equal(chars + FunctionNameOffset + 1,
data/mozjs78-78.4.0/js/src/jsapi-tests/testScriptSourceCompression.cpp:183:17:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
           std::equal(chars + len - FunctionEndLength, chars + len,
data/mozjs78-78.4.0/js/src/jsapi-tests/testStructuredClone.cpp:187:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  CHECK(clonedBuffer.read(cx, v2));
data/mozjs78-78.4.0/js/src/jsapi-tests/testStructuredClone.cpp:206:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  static bool read(JSContext* cx, JSStructuredCloneReader* reader,
data/mozjs78-78.4.0/js/src/jsapi-tests/testStructuredClone.cpp:247:68:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  JS_InitReadPrincipalsCallback(cx, StructuredCloneTestPrincipals::read);
data/mozjs78-78.4.0/js/src/jsapi-tests/testUbiNode.cpp:197:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  auto expectedLength = strlen(expected);
data/mozjs78-78.4.0/js/src/jsapi-tests/testValueABI.cpp:31:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  bool equal;
data/mozjs78-78.4.0/js/src/jsapi-tests/testValueABI.cpp:33:38:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  CHECK(JS_StrictlyEqual(cx, v, v2, &equal));
data/mozjs78-78.4.0/js/src/jsapi-tests/testValueABI.cpp:34:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  CHECK(equal);
data/mozjs78-78.4.0/js/src/jsapi-tests/testXDR.cpp:130:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    CHECK(srcBuf.init(cx, *s, strlen(*s), JS::SourceOwnership::Borrowed));
data/mozjs78-78.4.0/js/src/jsapi-tests/testXDR.cpp:141:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    bool equal;
data/mozjs78-78.4.0/js/src/jsapi-tests/testXDR.cpp:142:46:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    CHECK(JS_StringEqualsAscii(cx, out, *s, &equal));
data/mozjs78-78.4.0/js/src/jsapi-tests/testXDR.cpp:143:11:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    CHECK(equal);
data/mozjs78-78.4.0/js/src/jsapi-tests/testXDR.cpp:163:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(*sm);
data/mozjs78-78.4.0/js/src/jsapi-tests/tests.cpp:56:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return (srcBuf.init(cx, utf8, strlen(utf8), JS::SourceOwnership::Borrowed) &&
data/mozjs78-78.4.0/js/src/jsapi-tests/tests.cpp:68:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return srcBuf.init(cx, utf8, strlen(utf8), JS::SourceOwnership::Borrowed) &&
data/mozjs78-78.4.0/js/src/jsapi-tests/tests.cpp:78:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return (srcBuf.init(cx, utf8, strlen(utf8), JS::SourceOwnership::Borrowed) &&
data/mozjs78-78.4.0/js/src/jsapi-tests/tests.h:43:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!chars.append(s, strlen(s))) {
data/mozjs78-78.4.0/js/src/jsapi-tests/tests.h:488:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      : contents_(strdup(str)), len_(strlen(str) + 1) {}
data/mozjs78-78.4.0/js/src/jsapi.cpp:2017:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* atom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/jsapi.cpp:2046:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* atom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/jsapi.cpp:2240:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* atom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/jsapi.cpp:2258:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* atom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/jsapi.cpp:2270:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* atom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/jsapi.cpp:2488:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* atom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/jsapi.cpp:2529:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* atom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/jsapi.cpp:2565:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* atom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/jsapi.cpp:2613:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* atom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/jsapi.cpp:2692:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* atom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/jsapi.cpp:2808:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* atom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/jsapi.cpp:2916:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* atom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/jsapi.cpp:3001:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* getterNameAtom = Atomize(cx, getterName, strlen(getterName));
data/mozjs78-78.4.0/js/src/jsapi.cpp:3022:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    JSAtom* setterNameAtom = Atomize(cx, setterName, strlen(setterName));
data/mozjs78-78.4.0/js/src/jsapi.cpp:3070:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    RootedAtom atom(cx, Atomize(cx, u.value.string, strlen(u.value.string)));
data/mozjs78-78.4.0/js/src/jsapi.cpp:3091:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    JSAtom* atom = Atomize(cx, name.string(), strlen(name.string()), pin);
data/mozjs78-78.4.0/js/src/jsapi.cpp:3242:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    JSContext* cx, JSReadPrincipalsOp read) {
data/mozjs78-78.4.0/js/src/jsapi.cpp:3243:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  MOZ_ASSERT(read);
data/mozjs78-78.4.0/js/src/jsapi.cpp:3245:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  cx->runtime()->readPrincipals = read;
data/mozjs78-78.4.0/js/src/jsapi.cpp:3258:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    atom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/jsapi.cpp:3283:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* shAtom = Atomize(cx, selfHostedName, strlen(selfHostedName));
data/mozjs78-78.4.0/js/src/jsapi.cpp:3320:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        Atomize(cx, fs->selfHostedName, strlen(fs->selfHostedName));
data/mozjs78-78.4.0/js/src/jsapi.cpp:3423:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* atom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/jsapi.cpp:4202:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return JS_AtomizeStringN(cx, s, strlen(s));
data/mozjs78-78.4.0/js/src/jsapi.cpp:4213:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return JS_AtomizeAndPinStringN(cx, s, strlen(s));
data/mozjs78-78.4.0/js/src/jsexn.cpp:141:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t filenameSize = report->filename ? strlen(report->filename) + 1 : 0;
data/mozjs78-78.4.0/js/src/jsexn.cpp:144:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    messageSize = strlen(report->message().c_str()) + 1;
data/mozjs78-78.4.0/js/src/jsexn.cpp:622:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    toStringResult_ = JS::ConstUTF8CharsZ(utf8Message, strlen(utf8Message));
data/mozjs78-78.4.0/js/src/jsexn.cpp:779:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!sb.append(s, strlen(s))) {
data/mozjs78-78.4.0/js/src/jsfriendapi.cpp:222:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  RootedAtom atom(cx, Atomize(cx, value, strlen(value)));
data/mozjs78-78.4.0/js/src/jsfriendapi.cpp:237:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    JSAtom* atom = Atomize(cx, fs->name, strlen(fs->name));
data/mozjs78-78.4.0/js/src/jsfriendapi.cpp:409:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* atom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/jsfriendapi.cpp:429:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    atom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/jsnum.cpp:939:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t thousandsLength = strlen(rt->thousandsSeparator);
data/mozjs78-78.4.0/js/src/jsnum.cpp:940:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t decimalLength = strlen(rt->decimalSeparator);
data/mozjs78-78.4.0/js/src/jsnum.cpp:943:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int buflen = strlen(num);
data/mozjs78-78.4.0/js/src/jsnum.cpp:1004:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    MOZ_ASSERT(tmpDest - buf + ptrdiff_t(strlen(nint + 1)) <= buflen);
data/mozjs78-78.4.0/js/src/jsnum.cpp:1007:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    MOZ_ASSERT(tmpDest - buf + ptrdiff_t(strlen(nint)) <= buflen);
data/mozjs78-78.4.0/js/src/jsnum.cpp:1328:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t thousandsSeparatorSize = strlen(thousandsSeparator) + 1;
data/mozjs78-78.4.0/js/src/jsnum.cpp:1329:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t decimalPointSize = strlen(decimalPoint) + 1;
data/mozjs78-78.4.0/js/src/jsnum.cpp:1330:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t groupingSize = strlen(grouping) + 1;
data/mozjs78-78.4.0/js/src/jsnum.cpp:1534:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    MOZ_ASSERT(numStrLen == strlen(numStr));
data/mozjs78-78.4.0/js/src/jsnum.cpp:1549:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    numStrLen = strlen(numStr);
data/mozjs78-78.4.0/js/src/jsnum.cpp:1602:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(numStr);
data/mozjs78-78.4.0/js/src/jsnum.cpp:1647:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    MOZ_ASSERT(cstrlen == strlen(cstr));
data/mozjs78-78.4.0/js/src/jsnum.cpp:1654:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cstrlen = strlen(cstr);
data/mozjs78-78.4.0/js/src/new-regexp/regexp-compiler-tonode.cc:1388:69:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                                               character_ranges->at(read));
data/mozjs78-78.4.0/js/src/new-regexp/regexp-compiler-tonode.cc:1390:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  } while (read < n);
data/mozjs78-78.4.0/js/src/new-regexp/regexp-parser.cc:1409:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  DCHECK(name_1->size() - 1 == std::strlen(name_1->data()));
data/mozjs78-78.4.0/js/src/new-regexp/regexp-parser.cc:1410:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  DCHECK(name_2->empty() || name_2->size() - 1 == std::strlen(name_2->data()));
data/mozjs78-78.4.0/js/src/new-regexp/util/vector.h:162:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return Vector<const char>(data, strlen(data));
data/mozjs78-78.4.0/js/src/shell/OSObject.cpp:140:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buffer, scriptFilename.get(), PATH_MAX);
data/mozjs78-78.4.0/js/src/shell/OSObject.cpp:147:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    memmove(buffer, dirname(buffer), strlen(buffer) + 1);
data/mozjs78-78.4.0/js/src/shell/OSObject.cpp:156:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(buffer);
data/mozjs78-78.4.0/js/src/shell/OSObject.cpp:158:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(buffer + len + 1, filename.get(), sizeof(buffer) - (len + 1));
data/mozjs78-78.4.0/js/src/shell/OSObject.cpp:385:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t pathlen = strlen(pathname.get());
data/mozjs78-78.4.0/js/src/shell/js.cpp:733:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len += strlen(current);
data/mozjs78-78.4.0/js/src/shell/js.cpp:817:13:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int ch1 = fgetc(file);
data/mozjs78-78.4.0/js/src/shell/js.cpp:818:13:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int ch2 = fgetc(file);
data/mozjs78-78.4.0/js/src/shell/js.cpp:819:13:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int ch3 = fgetc(file);
data/mozjs78-78.4.0/js/src/shell/js.cpp:1423:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!buffer.append(line.get(), strlen(line.get())) ||
data/mozjs78-78.4.0/js/src/shell/js.cpp:2643:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t buflen = strlen(currentBuf);
data/mozjs78-78.4.0/js/src/shell/js.cpp:3475:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JS::ConstUTF8CharsZ utf8chars(sprinter.string(), strlen(sprinter.string()));
data/mozjs78-78.4.0/js/src/shell/js.cpp:5901:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      readCount = read(fd, bytes->begin() + lastLength, ChunkSize);
data/mozjs78-78.4.0/js/src/shell/js.cpp:6783:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!stack.append(frames[i].label, strlen(frames[i].label))) {
data/mozjs78-78.4.0/js/src/shell/js.cpp:7842:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      RootedString string(cx, Atomize(cx, name, strlen(name)));
data/mozjs78-78.4.0/js/src/shell/js.cpp:10151:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!srcBuf.init(cx, code, strlen(code), JS::SourceOwnership::Borrowed)) {
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:141:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t lengths[4] = {strlen(fmt[0]) - 3, strlen(fmt[1]) - 3,
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:141:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t lengths[4] = {strlen(fmt[0]) - 3, strlen(fmt[1]) - 3,
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:142:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       strlen(fmt[2]) - 5, strlen(fmt[3]) - 5};
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:142:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       strlen(fmt[2]) - 5, strlen(fmt[3]) - 5};
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:178:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      lhsLen = std::max(lhsLen, strlen(arg->longflag) + fmtChars);
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:198:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t longflagLen = strlen(opt->longflag);
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:205:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len += strlen(opt->asValued()->metavar);
data/mozjs78-78.4.0/js/src/shell/jsoptparse.cpp:472:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t targetLen = strlen(target);
data/mozjs78-78.4.0/js/src/shell/jsshell.cpp:86:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!buf.append(name, strlen(name)) ||
data/mozjs78-78.4.0/js/src/shell/jsshell.cpp:93:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!buf.append(cbuf, strlen(cbuf))) {
data/mozjs78-78.4.0/js/src/threading/posix/PosixThread.cpp:93:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(nameBuf, name, sizeof nameBuf - 1);
data/mozjs78-78.4.0/js/src/util/CompleteFile.cpp:36:7:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      getc
data/mozjs78-78.4.0/js/src/util/Text.cpp:62:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return DuplicateStringToArena(destArenaId, cx, s, strlen(s));
data/mozjs78-78.4.0/js/src/util/Text.cpp:95:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return DuplicateStringToArena(destArenaId, s, strlen(s));
data/mozjs78-78.4.0/js/src/util/Text.cpp:333:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t flaglen = strlen(flag);
data/mozjs78-78.4.0/js/src/util/Utility.cpp:156:50:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
               intptr_t(new char[16]) + intptr_t(memalign(16, 16)) +
data/mozjs78-78.4.0/js/src/vm/BigIntType.cpp:3224:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
bool BigInt::equal(BigInt* lhs, BigInt* rhs) {
data/mozjs78-78.4.0/js/src/vm/BigIntType.cpp:3373:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
bool BigInt::equal(BigInt* lhs, double rhs) {
data/mozjs78-78.4.0/js/src/vm/BigIntType.cpp:3380:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
JS::Result<bool> BigInt::equal(JSContext* cx, Handle<BigInt*> lhs,
data/mozjs78-78.4.0/js/src/vm/BigIntType.cpp:3387:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  return equal(lhs, rhsBigInt);
data/mozjs78-78.4.0/js/src/vm/BigIntType.cpp:3395:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    return equal(lhs, rhs.toBigInt());
data/mozjs78-78.4.0/js/src/vm/BigIntType.cpp:3403:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    return equal(cx, lhs, rhsString);
data/mozjs78-78.4.0/js/src/vm/BigIntType.cpp:3419:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    return equal(lhs, rhs.toNumber());
data/mozjs78-78.4.0/js/src/vm/BigIntType.h:248:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  static bool equal(BigInt* lhs, BigInt* rhs);
data/mozjs78-78.4.0/js/src/vm/BigIntType.h:249:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  static bool equal(BigInt* lhs, double rhs);
data/mozjs78-78.4.0/js/src/vm/BigIntType.h:250:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  static JS::Result<bool> equal(JSContext* cx, Handle<BigInt*> lhs,
data/mozjs78-78.4.0/js/src/vm/BytecodeUtil.cpp:2227:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      return Atomize(cx, destructuredParam, strlen(destructuredParam));
data/mozjs78-78.4.0/js/src/vm/BytecodeUtil.cpp:2511:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      JS::ConstUTF8CharsZ utf8chars(result.get(), strlen(result.get()));
data/mozjs78-78.4.0/js/src/vm/BytecodeUtil.cpp:2779:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      JS::ConstUTF8CharsZ utf8chars(text.get(), strlen(text.get()));
data/mozjs78-78.4.0/js/src/vm/CharacterEncoding.cpp:103:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    size_t read;
data/mozjs78-78.4.0/js/src/vm/CharacterEncoding.cpp:105:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    Tie(read, written) = ConvertLatin1toUtf8Partial(source, dst);
data/mozjs78-78.4.0/js/src/vm/CharacterEncoding.cpp:106:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    Unused << read;
data/mozjs78-78.4.0/js/src/vm/CharacterEncoding.cpp:110:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  size_t read;
data/mozjs78-78.4.0/js/src/vm/CharacterEncoding.cpp:112:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  Tie(read, written) = ConvertUtf16toUtf8Partial(source, dst);
data/mozjs78-78.4.0/js/src/vm/CharacterEncoding.cpp:113:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  Unused << read;
data/mozjs78-78.4.0/js/src/vm/CharacterEncoding.cpp:442:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  UTF8Chars chars(utf8.c_str(), strlen(utf8.c_str()));
data/mozjs78-78.4.0/js/src/vm/CharacterEncoding.cpp:458:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  UTF8Chars chars(utf8.c_str(), strlen(utf8.c_str()));
data/mozjs78-78.4.0/js/src/vm/CompilationAndEvaluation.cpp:218:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t nameLen = strlen(name);
data/mozjs78-78.4.0/js/src/vm/CompilationAndEvaluation.cpp:246:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!funStr_.append(argnames[i], strlen(argnames[i]))) {
data/mozjs78-78.4.0/js/src/vm/DateTime.cpp:635:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (std::strlen(tz) > linkNameLen) {
data/mozjs78-78.4.0/js/src/vm/DateTime.cpp:687:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (std::strlen(linkName) + len > linkNameLen) {
data/mozjs78-78.4.0/js/src/vm/DateTime.cpp:696:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t timeZoneLen = std::strlen(timeZone);
data/mozjs78-78.4.0/js/src/vm/EqualityOperations.cpp:28:66:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                               JS::Handle<JS::Value> rval, bool* equal) {
data/mozjs78-78.4.0/js/src/vm/EqualityOperations.cpp:32:67:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    return js::EqualStrings(cx, lval.toString(), rval.toString(), equal);
data/mozjs78-78.4.0/js/src/vm/EqualityOperations.cpp:41:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    *equal = JS::BigInt::equal(lval.toBigInt(), rval.toBigInt());
data/mozjs78-78.4.0/js/src/vm/EqualityOperations.cpp:51:55:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  MOZ_ASSERT_IF(lval.isUndefined() || lval.isNull(), *equal);
data/mozjs78-78.4.0/js/src/vm/EqualityOperations.cpp:185:65:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                                    Handle<Value> value2, bool* equal) {
data/mozjs78-78.4.0/js/src/vm/EqualityOperations.cpp:189:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  MOZ_ASSERT(equal);
data/mozjs78-78.4.0/js/src/vm/EqualityOperations.cpp:190:47:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  return js::LooselyEqual(cx, value1, value2, equal);
data/mozjs78-78.4.0/js/src/vm/EqualityOperations.cpp:194:58:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                       JS::Handle<JS::Value> rval, bool* equal) {
data/mozjs78-78.4.0/js/src/vm/EqualityOperations.cpp:196:47:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    return EqualGivenSameType(cx, lval, rval, equal);
data/mozjs78-78.4.0/js/src/vm/EqualityOperations.cpp:209:66:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                                     Handle<Value> value2, bool* equal) {
data/mozjs78-78.4.0/js/src/vm/EqualityOperations.cpp:213:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  MOZ_ASSERT(equal);
data/mozjs78-78.4.0/js/src/vm/EqualityOperations.cpp:214:48:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  return js::StrictlyEqual(cx, value1, value2, equal);
data/mozjs78-78.4.0/js/src/vm/EqualityOperations.h:31:61:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                          JS::Handle<JS::Value> rval, bool* equal);
data/mozjs78-78.4.0/js/src/vm/EqualityOperations.h:35:60:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                         JS::Handle<JS::Value> rval, bool* equal);
data/mozjs78-78.4.0/js/src/vm/ErrorReporting.cpp:259:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          lengths_[i] = strlen(args_[i]);
data/mozjs78-78.4.0/js/src/vm/ErrorReporting.cpp:265:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t len = strlen(reinterpret_cast<const char*>(latin1));
data/mozjs78-78.4.0/js/src/vm/ErrorReporting.cpp:273:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          lengths_[i] = strlen(utf8);
data/mozjs78-78.4.0/js/src/vm/ErrorReporting.cpp:289:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          lengths_[i] = strlen(utf8);
data/mozjs78-78.4.0/js/src/vm/ErrorReporting.cpp:358:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(efs->format);
data/mozjs78-78.4.0/js/src/vm/ErrorReporting.cpp:383:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
              strncpy(out, args.args(d), args.lengths(d));
data/mozjs78-78.4.0/js/src/vm/ErrorReporting.cpp:415:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t nbytes = strlen(defaultErrorMessage) + 16;
data/mozjs78-78.4.0/js/src/vm/ErrorReporting.cpp:557:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Latin1Chars latin1(message.get(), strlen(message.get()));
data/mozjs78-78.4.0/js/src/vm/GeckoProfiler.cpp:293:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nameLength = strlen(nameStr.get());
data/mozjs78-78.4.0/js/src/vm/Interpreter.cpp:2644:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    bool equal;                                       \
data/mozjs78-78.4.0/js/src/vm/Interpreter.cpp:2645:45:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    if (!js::StrictlyEqual(cx, lval, rval, &equal)) { \
data/mozjs78-78.4.0/js/src/vm/Interpreter.cpp:2648:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    (COND) = equal OP true;                           \
data/mozjs78-78.4.0/js/src/vm/JSONParser.cpp:293:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (chars.length() < strlen("9007199254740992")) {
data/mozjs78-78.4.0/js/src/vm/JSObject.cpp:1831:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  RootedAtom atom(cx, Atomize(cx, clasp->name, strlen(clasp->name)));
data/mozjs78-78.4.0/js/src/vm/JSScript.cpp:3718:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t filenameLen = strlen(filename);
data/mozjs78-78.4.0/js/src/vm/JSScript.cpp:3720:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t introducerLen = strlen(introducer);
data/mozjs78-78.4.0/js/src/vm/Printer.h:43:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  inline bool put(const char* s) { return put(s, strlen(s)); }
data/mozjs78-78.4.0/js/src/vm/SavedStacks.cpp:982:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return sb.append("0x") && sb.append(cstr, strlen(cstr));
data/mozjs78-78.4.0/js/src/vm/SavedStacks.cpp:1524:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      RootedAtom causeAtom(cx, AtomizeUTF8Chars(cx, cause, strlen(cause)));
data/mozjs78-78.4.0/js/src/vm/SavedStacks.cpp:1763:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      locationp.setSource(Atomize(cx, filename, strlen(filename)));
data/mozjs78-78.4.0/js/src/vm/SavedStacks.cpp:1788:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      source = Atomize(cx, filename, strlen(filename));
data/mozjs78-78.4.0/js/src/vm/SelfHosting.cpp:1660:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* funAtom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/vm/StringType.cpp:166:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      size_t read;
data/mozjs78-78.4.0/js/src/vm/StringType.cpp:168:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      mozilla::Tie(read, written) =
data/mozjs78-78.4.0/js/src/vm/StringType.cpp:171:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      totalRead += read;
data/mozjs78-78.4.0/js/src/vm/StringType.cpp:173:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (read < src.Length()) {
data/mozjs78-78.4.0/js/src/vm/StringType.cpp:1751:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(chars.get());
data/mozjs78-78.4.0/js/src/vm/StringType.h:1499:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return NewStringCopyN<allowGC>(cx, s, strlen(s));
data/mozjs78-78.4.0/js/src/vm/StringType.h:1510:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      cx, JS::UTF8Chars(utf8.c_str(), strlen(utf8.c_str())));
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:353:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  MOZ_MUST_USE bool read(uint64_t* p);
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:404:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  bool read(MutableHandleValue vp);
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:687:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return r.read(vp);
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:712:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
bool SCInput::read(uint64_t* p) {
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:724:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  bool ok = read(&u);
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:759:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (!read(&u)) {
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:836:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (!read(&u)) {
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:2164:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (!in.read(&n)) {
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:2253:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (!in.read(&n)) {
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:2633:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (!in.read(&arrayType)) {
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:2684:37:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (!callbacks || !callbacks->read) {
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:2701:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          callbacks->read(context(), this, cloneDataPolicy, tag, data, closure);
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:2780:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (!in.read(&numTransferables)) {
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:2804:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (!in.read(&extraData)) {
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:3008:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
bool JSStructuredCloneReader::read(MutableHandleValue vp) {
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:3214:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return buf.read(cx, vp, JS::CloneDataPolicy(), callbacks, closure);
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:3270:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
bool JSAutoStructuredCloneBuffer::read(
data/mozjs78-78.4.0/js/src/vm/StructuredClone.cpp:3325:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (!r->input().read(&arrayType)) {
data/mozjs78-78.4.0/js/src/vm/Time.cpp:378:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    real_year_len = strlen(real_year);
data/mozjs78-78.4.0/js/src/vm/Time.cpp:380:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fake_year_len = strlen(fake_year);
data/mozjs78-78.4.0/js/src/vm/Time.cpp:388:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      memmove(p + real_year_len, p + fake_year_len, strlen(p + fake_year_len));
data/mozjs78-78.4.0/js/src/vm/ToSource.cpp:76:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!quoted || !buf.append(quoted.get(), strlen(quoted.get()))) {
data/mozjs78-78.4.0/js/src/vm/ToSource.cpp:100:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!buf.append("new ") || !buf.append(constructor, strlen(constructor)) ||
data/mozjs78-78.4.0/js/src/vm/TraceLogging.cpp:684:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t length = strlen(eventString);
data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.cpp:59:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(outdir) + 1;  // "+ 1" is for the '/'
data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.cpp:91:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  MOZ_ASSERT(size_t(ret) <= len - (strlen(outdir) + 1),
data/mozjs78-78.4.0/js/src/vm/TraceLoggingGraph.cpp:702:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!js::FileEscapedString(dictFile, str.get(), strlen(str.get()), '"')) {
data/mozjs78-78.4.0/js/src/vm/TypedArrayObject.cpp:2389:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (s.length() != strlen(cstr) ||
data/mozjs78-78.4.0/js/src/vm/UbiNode.cpp:221:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      name16 = js_pod_malloc<char16_t>(strlen(name) + 1);
data/mozjs78-78.4.0/js/src/vm/UbiNodeCensus.cpp:380:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    JSAtom* atom = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/vm/Xdr.cpp:75:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    const uint8_t* ptr = buf->read(count);
data/mozjs78-78.4.0/js/src/vm/Xdr.cpp:103:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    const uint8_t* ptr = buf->read(nbytes);
data/mozjs78-78.4.0/js/src/vm/Xdr.h:82:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  const uint8_t* read(size_t n) {
data/mozjs78-78.4.0/js/src/vm/Xdr.h:100:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  const uint8_t* read(size_t n) {
data/mozjs78-78.4.0/js/src/vm/Xdr.h:266:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    const uint8_t* ptr = buf->read(length);
data/mozjs78-78.4.0/js/src/vm/Xdr.h:282:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      const uint8_t* ptr = buf->read(sizeof(*n));
data/mozjs78-78.4.0/js/src/vm/Xdr.h:299:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      const uint8_t* ptr = buf->read(sizeof(*n));
data/mozjs78-78.4.0/js/src/vm/Xdr.h:316:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      const uint8_t* ptr = buf->read(sizeof(*n));
data/mozjs78-78.4.0/js/src/vm/Xdr.h:333:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      const uint8_t* ptr = buf->read(sizeof(*n));
data/mozjs78-78.4.0/js/src/vm/Xdr.h:401:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      const uint8_t* ptr = buf->read(len);
data/mozjs78-78.4.0/js/src/vtune/ittnotify_config.h:333:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define __itt_fstrnlen(s, l)      strlen(s)
data/mozjs78-78.4.0/js/src/vtune/ittnotify_config.h:338:38:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#define __itt_fstrcpyn(s1, b, s2, l) strncpy(s1, s2, l)
data/mozjs78-78.4.0/js/src/vtune/ittnotify_static.c:903:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            res = read(cmdline_fd, package_name, PATH_MAX - 1);
data/mozjs78-78.4.0/js/src/vtune/ittnotify_static.c:940:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            res = read(itt_marker_file_fd, itt_lib_name, PATH_MAX - 1);
data/mozjs78-78.4.0/js/src/wasm/AsmJS.cpp:387:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return name->append(p, strlen(p));
data/mozjs78-78.4.0/js/src/wasm/AsmJS.cpp:1383:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      JSAtom* atom = Atomize(cx_, name, strlen(name));
data/mozjs78-78.4.0/js/src/wasm/AsmJS.cpp:1413:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      JSAtom* atom = Atomize(cx_, name, strlen(name));
data/mozjs78-78.4.0/js/src/wasm/AsmJS.cpp:6474:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  RootedAtom field(cx, AtomizeUTF8Chars(cx, fieldChars, strlen(fieldChars)));
data/mozjs78-78.4.0/js/src/wasm/WasmCode.cpp:256:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return bytes->append(str, strlen(str)) && bytes->append('\0');
data/mozjs78-78.4.0/js/src/wasm/WasmCode.cpp:493:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return chars ? strlen(chars) + 1 : 0;
data/mozjs78-78.4.0/js/src/wasm/WasmCode.cpp:1007:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return bytes->append(beforeFuncIndex, strlen(beforeFuncIndex)) &&
data/mozjs78-78.4.0/js/src/wasm/WasmCode.cpp:1008:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         bytes->append(funcIndexStr, strlen(funcIndexStr)) &&
data/mozjs78-78.4.0/js/src/wasm/WasmCode.cpp:1009:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         bytes->append(afterFuncIndex, strlen(afterFuncIndex));
data/mozjs78-78.4.0/js/src/wasm/WasmCode.cpp:1358:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!name.append(filename, strlen(filename))) {
data/mozjs78-78.4.0/js/src/wasm/WasmCode.cpp:1367:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!name.append(':') || !name.append(bytecodeStr, strlen(bytecodeStr)) ||
data/mozjs78-78.4.0/js/src/wasm/WasmDebug.cpp:453:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(SourceMappingURLSectionName) != sectionName.length() ||
data/mozjs78-78.4.0/js/src/wasm/WasmDebug.cpp:482:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (sourceMapURL && strlen(sourceMapURL)) {
data/mozjs78-78.4.0/js/src/wasm/WasmDebug.cpp:483:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    UTF8Chars utf8Chars(sourceMapURL, strlen(sourceMapURL));
data/mozjs78-78.4.0/js/src/wasm/WasmInstance.cpp:2294:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    JSString* filenamePrefix = EncodeURI(cx, filename, strlen(filename));
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:444:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* atom = AtomizeUTF8Chars(cx, chars, strlen(chars));
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:783:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* initialAtom = Atomize(cx, "initial", strlen("initial"));
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:805:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* maximumAtom = Atomize(cx, "maximum", strlen("maximum"));
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:834:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    JSAtom* sharedAtom = Atomize(cx, "shared", strlen("shared"));
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:873:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  RootedAtom className(cx, Atomize(cx, name, strlen(name)));
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:978:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* kind = Atomize(cx, "kind", strlen("kind"));
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:984:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* table = Atomize(cx, "table", strlen("table"));
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:990:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* memory = Atomize(cx, "memory", strlen("memory"));
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:996:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* signature = Atomize(cx, "signature", strlen("signature"));
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:1029:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!first && !buf.append(", ", strlen(", "))) {
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:1034:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!buf.append(argStr, strlen(argStr))) {
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:1041:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!buf.append(") -> (", strlen(") -> ("))) {
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:1047:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!first && !buf.append(", ", strlen(", "))) {
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:1052:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!buf.append(resultStr, strlen(resultStr))) {
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:1068:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                   JS::ConstUTF8CharsZ(chars, strlen(chars)));
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:2383:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* elementAtom = Atomize(cx, "element", strlen("element"));
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:3185:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(str.get());
data/mozjs78-78.4.0/js/src/wasm/WasmJS.cpp:4122:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    JSAtom* className = Atomize(cx, name, strlen(name));
data/mozjs78-78.4.0/js/src/wasm/WasmModule.cpp:1092:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strlen(exports[0].fieldName()) == 0) {
data/mozjs78-78.4.0/js/src/wasm/WasmModule.cpp:1117:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        AtomizeUTF8Chars(cx, exp.fieldName(), strlen(exp.fieldName()));
data/mozjs78-78.4.0/js/src/wasm/WasmModule.cpp:1177:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JSAtom* atom = Atomize(cx, buf, strlen(buf));
data/mozjs78-78.4.0/js/src/wasm/WasmValidate.h:483:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  MOZ_MUST_USE bool read(T* out) {
data/mozjs78-78.4.0/js/src/wasm/WasmValidate.h:641:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  MOZ_MUST_USE bool readFixedU8(uint8_t* i) { return read<uint8_t>(i); }
data/mozjs78-78.4.0/js/src/wasm/WasmValidate.h:642:56:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  MOZ_MUST_USE bool readFixedU32(uint32_t* u) { return read<uint32_t>(u); }
data/mozjs78-78.4.0/js/src/wasm/WasmValidate.h:643:53:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  MOZ_MUST_USE bool readFixedF32(float* f) { return read<float>(f); }
data/mozjs78-78.4.0/js/src/wasm/WasmValidate.h:644:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  MOZ_MUST_USE bool readFixedF64(double* d) { return read<double>(d); }
data/mozjs78-78.4.0/js/src/wasm/WasmValidate.h:648:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (!read<uint8_t>(d->bytes + i)) {
data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h:121:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define ZYAN_STRLEN     strlen
data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h:122:25:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
#define ZYAN_STRNCAT    strncat
data/mozjs78-78.4.0/js/src/zydis/Zycore/LibC.h:124:25:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#define ZYAN_STRNCPY    strncpy
data/mozjs78-78.4.0/js/src/zydis/ZydisAPI.cpp:65:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sprintf(buffer+strlen(buffer), "%s%02x", i == 0 ? "" : " ", *(code + offset + i));
data/mozjs78-78.4.0/js/src/zydis/ZydisAPI.cpp:69:5:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
    sprintf(buffer+strlen(buffer), " ");
data/mozjs78-78.4.0/js/src/zydis/ZydisAPI.cpp:69:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sprintf(buffer+strlen(buffer), " ");
data/mozjs78-78.4.0/js/src/zydis/ZydisAPI.cpp:72:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(buffer) < LIMIT) {
data/mozjs78-78.4.0/js/src/zydis/ZydisAPI.cpp:73:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      char* cur_end = buffer + strlen(buffer);
data/mozjs78-78.4.0/js/src/zydis/ZydisAPI.cpp:74:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t spaces = LIMIT - strlen(buffer);
data/mozjs78-78.4.0/js/src/zydis/ZydisAPI.cpp:80:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(buffer) > LIMIT) {
data/mozjs78-78.4.0/js/src/zydis/ZydisAPI.cpp:86:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t used = strlen(buffer);
data/mozjs78-78.4.0/memory/build/fallback.cpp:12:22:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
MOZ_MEMORY_API void* memalign(size_t aAlignment, size_t aSize) {
data/mozjs78-78.4.0/memory/build/malloc_decls.h:55:21:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
NOTHROW_MALLOC_DECL(memalign, void*, size_t, size_t)
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:1229:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (_write(STDERR_FILENO, p, (unsigned int)strlen(p)) < 0) {
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:4065:29:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
inline void* BaseAllocator::memalign(size_t aAlignment, size_t aSize) {
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:4155:19:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
template <void* (*memalign)(size_t, size_t)>
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:4167:14:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
    result = memalign(aAlignment, aSize);
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:4181:12:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
    return memalign(aAlignment, aSize);
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:4185:12:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
    return memalign(GetKernelPageSize(), aSize);
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:4192:27:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
  return AlignedAllocator<memalign>::posix_memalign(aMemPtr, aAlignment, aSize);
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:4197:27:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
  return AlignedAllocator<memalign>::aligned_alloc(aAlignment, aSize);
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:4202:27:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
  return AlignedAllocator<memalign>::valloc(aSize);
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:4749:14:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
      table->memalign != MozJemalloc::memalign) {
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:4749:39:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
      table->memalign != MozJemalloc::memalign) {
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:4751:41:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
        AlignedAllocator<ReplaceMalloc::memalign>::posix_memalign;
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:4754:14:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
      table->memalign != MozJemalloc::memalign) {
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:4754:39:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
      table->memalign != MozJemalloc::memalign) {
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:4756:41:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
        AlignedAllocator<ReplaceMalloc::memalign>::aligned_alloc;
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:4759:14:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
      table->memalign != MozJemalloc::memalign) {
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:4759:39:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
      table->memalign != MozJemalloc::memalign) {
data/mozjs78-78.4.0/memory/build/mozjemalloc.cpp:4760:53:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
    table->valloc = AlignedAllocator<ReplaceMalloc::memalign>::valloc;
data/mozjs78-78.4.0/memory/build/mozmemory_wrap.cpp:28:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(dst, src, len);
data/mozjs78-78.4.0/memory/build/mozmemory_wrap.cpp:35:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(src);
data/mozjs78-78.4.0/memory/build/mozmemory_wrap.cpp:95:16:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = wcslen(src);
data/mozjs78-78.4.0/memory/build/mozmemory_wrap.cpp:97:12:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  if (dst) wcsncpy(dst, src, len + 1);
data/mozjs78-78.4.0/memory/build/mozmemory_wrap.h:144:42:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
#define memalign_impl mozmem_malloc_impl(memalign)
data/mozjs78-78.4.0/memory/build/zone.c:45:11:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
  void* (*memalign)(struct _malloc_zone_t*, size_t, size_t);
data/mozjs78-78.4.0/memory/mozalloc/mozalloc.cpp:27:25:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
#  define memalign_impl memalign
data/mozjs78-78.4.0/memory/mozalloc/mozalloc.cpp:109:18:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
extern "C" void* memalign(size_t, size_t);
data/mozjs78-78.4.0/mfbt/ArrayUtils.h:94:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  return std::equal(a, a + N, b);
data/mozjs78-78.4.0/mfbt/ArrayUtils.h:99:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  return std::equal(a, a + n, b);
data/mozjs78-78.4.0/mfbt/Assertions.h:177:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = std::min(strlen(buf), buflen + 1 - 2);
data/mozjs78-78.4.0/mfbt/EndianUtils.h:334:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return read<uint16_t>(aPtr);
data/mozjs78-78.4.0/mfbt/EndianUtils.h:339:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return read<uint32_t>(aPtr);
data/mozjs78-78.4.0/mfbt/EndianUtils.h:344:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return read<uint64_t>(aPtr);
data/mozjs78-78.4.0/mfbt/EndianUtils.h:349:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return read<uintptr_t>(aPtr);
data/mozjs78-78.4.0/mfbt/EndianUtils.h:354:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return read<int16_t>(aPtr);
data/mozjs78-78.4.0/mfbt/EndianUtils.h:359:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return read<uint32_t>(aPtr);
data/mozjs78-78.4.0/mfbt/EndianUtils.h:364:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return read<int64_t>(aPtr);
data/mozjs78-78.4.0/mfbt/EndianUtils.h:369:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return read<intptr_t>(aPtr);
data/mozjs78-78.4.0/mfbt/EndianUtils.h:565:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  static T read(const void* aPtr) {
data/mozjs78-78.4.0/mfbt/JSONWriter.h:278:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Scalar(aMaybePropertyName, aStringValue, strlen(aStringValue));
data/mozjs78-78.4.0/mfbt/RandomNum.cpp:134:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t bytesRead = read(fd, &result, sizeof(result));
data/mozjs78-78.4.0/mfbt/Span.h:787:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
         std::equal(l.data(), l.data() + l.size(), r.data());
data/mozjs78-78.4.0/mfbt/Span.h:959:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return Span<const char>(aZeroTerminated, std::strlen(aZeroTerminated));
data/mozjs78-78.4.0/mfbt/Variant.h:177:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  static bool equal(const Variant& aLhs, const Variant& aRhs) {
data/mozjs78-78.4.0/mfbt/Variant.h:241:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  static bool equal(const Variant& aLhs, const Variant& aRhs) {
data/mozjs78-78.4.0/mfbt/Variant.h:246:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      return Next::equal(aLhs, aRhs);
data/mozjs78-78.4.0/mfbt/Variant.h:697:37:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    return tag == aRhs.tag && Impl::equal(*this, aRhs);
data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/utils.h:180:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(string);
data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/utils.h:273:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    DOUBLE_CONVERSION_ASSERT(static_cast<size_t>(n) <= strlen(s));
data/mozjs78-78.4.0/mfbt/double-conversion/double-conversion/utils.h:293:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    DOUBLE_CONVERSION_ASSERT(strlen(buffer_.start()) == static_cast<size_t>(position_));
data/mozjs78-78.4.0/mfbt/tests/TestJSONWriter.cpp:26:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(aStr);
data/mozjs78-78.4.0/mfbt/tests/TestPoisonArea.cpp:195:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t n = strlen(errmsg) - 1;
data/mozjs78-78.4.0/mfbt/tests/TestResult.cpp:206:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  auto res6 = res5.map(strlen);
data/mozjs78-78.4.0/modules/zlib/src/gzguts.h:48:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#  define read _read
data/mozjs78-78.4.0/modules/zlib/src/gzlib.c:199:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen((const char *)path);
data/mozjs78-78.4.0/modules/zlib/src/gzlib.c:605:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((state->msg = (char *)malloc(strlen(state->path) + strlen(msg) + 3)) ==
data/mozjs78-78.4.0/modules/zlib/src/gzlib.c:605:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((state->msg = (char *)malloc(strlen(state->path) + strlen(msg) + 3)) ==
data/mozjs78-78.4.0/modules/zlib/src/gzlib.c:611:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (void)snprintf(state->msg, strlen(state->path) + strlen(msg) + 3,
data/mozjs78-78.4.0/modules/zlib/src/gzlib.c:611:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (void)snprintf(state->msg, strlen(state->path) + strlen(msg) + 3,
data/mozjs78-78.4.0/modules/zlib/src/gzread.c:35:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ret = read(state->fd, buf + *have, get);
data/mozjs78-78.4.0/modules/zlib/src/gzwrite.c:370:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(str);
data/mozjs78-78.4.0/modules/zlib/src/gzwrite.c:426:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(next);
data/mozjs78-78.4.0/modules/zlib/src/gzwrite.c:524:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(next);
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBuffer.cpp:75:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t strLen = strlen(aStr) + 1;  // +1 for the null terminator
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileBufferEntry.cpp:671:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              const uint32_t pcLen = strlen(buf);
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileJSONWriter.cpp:16:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(aStr);
data/mozjs78-78.4.0/mozglue/baseprofiler/core/ProfileJSONWriter.cpp:50:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    MOZ_ASSERT(strlen(mChunkList[i].get()) == mChunkLengths[i]);
data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform-linux-android.cpp:452:24:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    MOZ_ALWAYS_TRUE(!::usleep(aMicroseconds));
data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform-macos.cpp:170:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
  usleep(aMicroseconds);
data/mozjs78-78.4.0/mozglue/baseprofiler/core/platform.cpp:2446:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(aString);
data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-linux.cc:332:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int name_len = strlen(name);
data/mozjs78-78.4.0/mozglue/baseprofiler/core/shared-libraries-linux.cc:788:11:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
    ret = sscanf(line.c_str(),
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulElfInt.h:199:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int name_len = strlen(name);
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.cpp:1779:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  bool passed = nConsistent + 1 == strlen(dstring);
data/mozjs78-78.4.0/mozglue/baseprofiler/lul/LulMain.cpp:1787:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 (int)nConsistent, (int)strlen(dstring),
data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferEntrySerialization.h:701:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const auto len = strlen(aS.mCString);
data/mozjs78-78.4.0/mozglue/baseprofiler/public/ProfileBufferEntrySerialization.h:707:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const auto len = strlen(aS.mCString);
data/mozjs78-78.4.0/mozglue/misc/Printf.cpp:348:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int slen = int(strlen(s));
data/mozjs78-78.4.0/mozglue/misc/Printf.h:148:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      : mMaxlen(base ? strlen(base) : 0),
data/mozjs78-78.4.0/mozglue/misc/StackWalk.cpp:600:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(aDetails->library, modInfo.LoadedImageName,
data/mozjs78-78.4.0/mozglue/misc/StackWalk.cpp:606:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(aDetails->filename, lineInfo.FileName,
data/mozjs78-78.4.0/mozglue/misc/StackWalk.cpp:624:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(aDetails->function, pSymbol->Name, sizeof(aDetails->function));
data/mozjs78-78.4.0/mozglue/misc/StackWalk.cpp:666:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(aBuffer, demangled, aBufLen);
data/mozjs78-78.4.0/mozglue/misc/StackWalk.cpp:794:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(aDetails->library, info.dli_fname, sizeof(aDetails->library));
data/mozjs78-78.4.0/mozglue/misc/StackWalk.cpp:812:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(aDetails->function, symbol, sizeof(aDetails->function));
data/mozjs78-78.4.0/mozglue/misc/WindowsUnicode.cpp:43:27:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return WideToUTF8(aStr, wcslen(aStr));
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:62:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            program, (int)strlen(program), "");
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:162:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                lplen = strlen(linkprefix);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:219:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    tdlen = strlen(todir);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:226:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(name);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:228:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        bnlen = strlen(base);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:269:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    len = strlen(linkname);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:310:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            while ((cc = read(fromfd, bp, sizeof buf)) > 0) {
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:468:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strcpy((char*)xmalloc(strlen(s) + 1), s);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:510:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(strcpy(outpath, to));
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:523:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len += strlen(outpath + len);
data/mozjs78-78.4.0/nsprpub/config/nsinstall.c:547:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = strlen(name);
data/mozjs78-78.4.0/nsprpub/lib/libc/src/base64.c:122:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(src);
data/mozjs78-78.4.0/nsprpub/lib/libc/src/base64.c:367:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(src);
data/mozjs78-78.4.0/nsprpub/lib/libc/src/plgetopt.c:152:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            strlen(internal->xargv);
data/mozjs78-78.4.0/nsprpub/lib/libc/src/plgetopt.c:164:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(longOpt->longOptName) != optNameLen) {
data/mozjs78-78.4.0/nsprpub/lib/libc/src/strcase.c:108:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ll = strlen(little);
data/mozjs78-78.4.0/nsprpub/lib/libc/src/strcase.c:132:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bl = strlen(big);
data/mozjs78-78.4.0/nsprpub/lib/libc/src/strcase.c:133:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ll = strlen(little);
data/mozjs78-78.4.0/nsprpub/lib/libc/src/strcase.c:160:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ll = strlen(little);
data/mozjs78-78.4.0/nsprpub/lib/libc/src/strcase.c:189:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ll = strlen(little);
data/mozjs78-78.4.0/nsprpub/lib/libc/src/strdup.c:20:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(s) + 1;
data/mozjs78-78.4.0/nsprpub/lib/libc/src/strlen.c:20:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(str);
data/mozjs78-78.4.0/nsprpub/lib/libc/src/strstr.c:36:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ll = strlen(little);
data/mozjs78-78.4.0/nsprpub/lib/libc/src/strstr.c:37:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bl = strlen(big);
data/mozjs78-78.4.0/nsprpub/lib/libc/src/strstr.c:64:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ll = strlen(little);
data/mozjs78-78.4.0/nsprpub/lib/libc/src/strstr.c:93:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ll = strlen(little);
data/mozjs78-78.4.0/nsprpub/lib/prstreams/tests/testprstrm/testprstrm.cpp:51:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(fname2, "2");
data/mozjs78-78.4.0/nsprpub/pr/include/prio.h:354:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    PRReadFN read;                  /* read up to specified bytes into buffer   */
data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcfileio.cpp:61:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return fd->methods->read(fd, buf, amount);
data/mozjs78-78.4.0/nsprpub/pr/src/cplus/rcnetio.cpp:125:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return (fd->methods->read)(fd, buf, amount);
data/mozjs78-78.4.0/nsprpub/pr/src/io/priometh.c:109:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return((fd->methods->read)(fd,buf,amount));
data/mozjs78-78.4.0/nsprpub/pr/src/io/prlayer.c:82:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return (fd->lower->methods->read)(fd->lower, buf, amount);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prlayer.c:623:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        name = (char*)PR_Malloc(strlen(layer_name) + 1);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prlog.c:198:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        PRIntn evlen = strlen(ev), pos = 0;
data/mozjs78-78.4.0/nsprpub/pr/src/io/prlog.c:322:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        PRIntn evlen = strlen(ev), pos = 0;
data/mozjs78-78.4.0/nsprpub/pr/src/io/prlog.c:492:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nb = strlen(line_long);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prprf.c:346:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return (*ss->stuff)(ss, fout, strlen(fout));
data/mozjs78-78.4.0/nsprpub/pr/src/io/prprf.c:375:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        slen = strlen(str);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prprf.c:1295:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t lastlen = strlen(last);
data/mozjs78-78.4.0/nsprpub/pr/src/io/prstdio.c:32:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(msg);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:124:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        PR_SetErrorText(strlen(error), error);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:282:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(ev) + 1;        /* +1 for the null */
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:807:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          const size_t systemPrefixLen1 = strlen(systemPrefix1);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:809:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          const size_t systemPrefixLen2 = strlen(systemPrefix2);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:810:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          const name_len = strlen(name);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:1287:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result = PR_Malloc(strlen(dli.dli_fname)+1);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:1300:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            result = PR_Malloc(strlen(image_name)+1);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:1355:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            result = PR_Malloc(strlen(infop->ldinfo_filename)+1);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:1376:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            result = PR_Malloc(strlen(desc.filename)+1);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:1393:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            result = PR_Malloc(strlen(desc.filename)+1);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:1419:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result = PR_Malloc(strlen(module_name)+1);
data/mozjs78-78.4.0/nsprpub/pr/src/linking/prlink.c:1472:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result = PR_Malloc(strlen(module_name)+1);
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c:157:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(name) + 1;
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c:461:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    FlipSlashes( filename, strlen(filename) );
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c:566:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    FlipSlashes(filename, strlen(filename));
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2io.c:585:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int len = strlen(fn);
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:109:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cmdLineSize += strlen(*arg) + 1; /* space in between */
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:120:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(*cmdLine, " ");
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:165:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cwdStart += strlen(cwdStart) + 1;
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:169:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cwdEnd += strlen(cwdEnd) + 1;
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:175:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            cwdEnd += strlen(cwdEnd) + 1;
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:181:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        envBlockSize += strlen(*env) + 1;
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:266:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(path) + 1;
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:332:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pszFormatResult = PR_MALLOC(strlen(pszFormatString)+strlen(path)+strlen(cmdLine));
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:332:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pszFormatResult = PR_MALLOC(strlen(pszFormatString)+strlen(path)+strlen(cmdLine));
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:332:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pszFormatResult = PR_MALLOC(strlen(pszFormatString)+strlen(path)+strlen(cmdLine));
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:375:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pszCmdLine = PR_MALLOC(strlen(pszEXEName) +
data/mozjs78-78.4.0/nsprpub/pr/src/md/os2/os2misc.c:376:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                               strlen(startData.PgmInputs) + 3);
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:311:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((rv = read(osfd,buf,amount)) == -1) {
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:791:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((rv = read(osfd,buf,amount)) == -1) {
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:1666:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                while ((rv = read(_pr_md_pipefd[0], _pr_md_pipebuf,
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:1866:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                            read(_pr_md_pipefd[0], _pr_md_pipebuf, PIPE_BUF))
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/unix.c:1932:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                    read(_pr_md_pipefd[0], _pr_md_pipebuf, PIPE_BUF))
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxproces.c:623:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            rv = read(pr_wp.pipefd[0], buf, sizeof(buf));
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxproces.c:680:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        write(2, msg, strlen(msg) + 1);
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxrng.c:92:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    bytesIn = read( fdDevURandom, buf, size );
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxshm.c:68:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    shm->ipcname = (char*)PR_MALLOC( strlen( ipcname ) + 1 );
data/mozjs78-78.4.0/nsprpub/pr/src/md/unix/uxshm.c:307:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    shm->ipcname = PR_MALLOC( strlen( ipcname ) + 1 );
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c:2829:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(name);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c:2845:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    FlipSlashes( filename, strlen(filename) );
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntio.c:2980:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int len = strlen(fn);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntmisc.c:367:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cmdLineSize += 2 * strlen(*arg)  /* \ and " need to be escaped */
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntmisc.c:494:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cwdStart += strlen(cwdStart) + 1;
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntmisc.c:498:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cwdEnd += strlen(cwdEnd) + 1;
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntmisc.c:504:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            cwdEnd += strlen(cwdEnd) + 1;
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/ntmisc.c:510:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        envBlockSize += strlen(*env) + 1;
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w32shm.c:63:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    shm->ipcname = PR_MALLOC( (PRUint32) (strlen( ipcname ) + 1) );
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:477:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(name);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:493:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    FlipSlashes( filename, strlen(filename) );
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:628:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(fn);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:1141:11:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = wcslen(name);
data/mozjs78-78.4.0/nsprpub/pr/src/md/windows/w95io.c:1157:29:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    FlipSlashesW( filename, wcslen(filename) );
data/mozjs78-78.4.0/nsprpub/pr/src/misc/dtoa.c:1839:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  MALLOC(strlen((CONST char*)s0) + 1))) {
data/mozjs78-78.4.0/nsprpub/pr/src/misc/pratom.c:315:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        stack->prstk_name = (char *) PR_Malloc(strlen(stack_name) + 1);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prcountr.c:131:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    PR_ASSERT( strlen(qName) <= PRCOUNTER_NAME_MAX );
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prcountr.c:132:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    PR_ASSERT( strlen(rName) <= PRCOUNTER_NAME_MAX );
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prcountr.c:133:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    PR_ASSERT( strlen(description) <= PRCOUNTER_DESC_MAX );
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prdtoa.c:3602:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    resultlen = strlen(result)+1;
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prenv.c:143:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = strlen(*src) + 1;
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prerrortable.c:127:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(buffer, " ");
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prinit.c:529:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    attr->currentDirectory = (char *) PR_MALLOC(strlen(dir) + 1);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prinit.c:581:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        newSize = NSPR_INHERIT_FDS_STRLEN + strlen(name)
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prinit.c:585:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        newSize = attr->fdInheritBufferUsed + strlen(name)
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prinit.c:626:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(name);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/pripc.c:83:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(name) >= (PRSize)size) {
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:521:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(from->h_name) + 1;
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:545:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = strlen(*ap) + 1;
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:603:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(from->p_name) + 1;
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prnetdb.c:620:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(*ap) + 1;
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prsystem.c:224:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                strsize = strlen(buf);
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prtime.c:1914:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   PRUint32 strSize = strlen( str );              \
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prtrace.c:205:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    PR_ASSERT( strlen(qName) <= PRTRACE_NAME_MAX );
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prtrace.c:206:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    PR_ASSERT( strlen(rName) <= PRTRACE_NAME_MAX );
data/mozjs78-78.4.0/nsprpub/pr/src/misc/prtrace.c:207:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    PR_ASSERT( strlen(description) <= PRTRACE_DESC_MAX );
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptio.c:792:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    op->result.code = read(
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptio.c:809:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        op->result.code = read(
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptio.c:1330:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    bytes = read(fd->secret->md.osfd, buf, amount);
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptio.c:1928:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        bytes = read(fd->secret->md.osfd, buf, amount);
data/mozjs78-78.4.0/nsprpub/pr/src/pthreads/ptthread.c:1667:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nameLen = strlen(name);
data/mozjs78-78.4.0/nsprpub/pr/src/threads/combined/pruthr.c:1643:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nameLen = strlen(name);
data/mozjs78-78.4.0/nsprpub/pr/src/threads/prrwlock.c:115:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        rwlock->rw_name = (char*) PR_Malloc(strlen(lock_name) + 1);
data/mozjs78-78.4.0/nsprpub/pr/tests/dbmalloc.c:47:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int l = strlen(line);
data/mozjs78-78.4.0/nsprpub/pr/tests/dbmalloc.c:146:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if( (strlen(buffer) == (BUFSIZ-1)) && (buffer[BUFSIZ-2] != '\n') ) {
data/mozjs78-78.4.0/nsprpub/pr/tests/errset.c:147:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        PR_SetErrorText( strlen(errcodes[errnum].errname), errcodes[errnum].errname );
data/mozjs78-78.4.0/nsprpub/pr/tests/forktest.c:88:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (PR_Send(sock, message, strlen(message) + 1, 0, PR_INTERVAL_NO_TIMEOUT) ==
data/mozjs78-78.4.0/nsprpub/pr/tests/libfilename.c:66:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    name = PR_Malloc(strlen("libnspr4.dll")+1);
data/mozjs78-78.4.0/nsprpub/pr/tests/lockfile.c:150:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    PRUintn spaces = strlen(msg);
data/mozjs78-78.4.0/nsprpub/pr/tests/prftest.c:38:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(answer, "f");
data/mozjs78-78.4.0/nsprpub/pr/tests/prftest1.c:106:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(answer, "f");
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:432:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strcat(fmt+strlen(fmt), signs[s]);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:435:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strcat(fmt+strlen(fmt), precs[p]);
data/mozjs78-78.4.0/nsprpub/pr/tests/sprintf.c:438:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strcat(fmt+strlen(fmt), formats[f]);
data/mozjs78-78.4.0/nsprpub/pr/tests/stdio.c:33:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen("This to standard out\n"));
data/mozjs78-78.4.0/nsprpub/pr/tests/stdio.c:34:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    PR_ASSERT((PRInt32)strlen("This to standard out\n") == rv);
data/mozjs78-78.4.0/nsprpub/pr/tests/stdio.c:37:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             strlen("This to standard err\n"));
data/mozjs78-78.4.0/nsprpub/pr/tests/stdio.c:38:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    PR_ASSERT((PRInt32)strlen("This to standard err\n") == rv);
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:429:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(pathname, "/");
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:628:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(pathname, "/");
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:630:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    path_len = strlen(pathname);
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:653:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(pathname, "/");
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:741:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(pathname, "/");
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:796:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(pathname, "/");
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:852:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(pathname, "/");
data/mozjs78-78.4.0/nsprpub/pr/tests/testfile.c:854:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    path_len = strlen(pathname);
data/mozjs78-78.4.0/nsprpub/tools/httpget.c:369:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    PR_ASSERT(cmdSize == (PRIntn) strlen("GET  HTTP/1.0\r\n\r\n")
data/mozjs78-78.4.0/nsprpub/tools/httpget.c:370:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              + (PRIntn) strlen(path));
data/mozjs78-78.4.0/nsprpub/tools/tail.c:114:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            PRInt32 read, bytes = fileInfo.size - position;
data/mozjs78-78.4.0/nsprpub/tools/tail.c:119:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if (read != bytes) {
data/mozjs78-78.4.0/nsprpub/tools/tail.c:122:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            position += read;
data/mozjs78-78.4.0/nsprpub/tools/tail.c:123:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            PR_Write(out, buffer, read);
data/mozjs78-78.4.0/third_party/python/MarkupSafe/src/markupsafe/_speedups.c:15:84:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define UNICHR(x) (PyUnicode_AS_UNICODE((PyUnicodeObject*)PyUnicode_DecodeASCII(x, strlen(x), NULL)));
data/mozjs78-78.4.0/third_party/python/coverage/coverage/ctracer/tracer.c:130:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return spaces + strlen(spaces) - n*2;
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_aix.c:74:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    nbytes = read(fd, fstruct, size);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_aix.c:322:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(id.name, "");
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_aix.c:682:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(ifr.ifr_name, nic_name, sizeof(ifr.ifr_name));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_aix.c:774:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(id.name, "");
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_aix.c:953:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(id.name, "");
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_bsd.c:743:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(ifc_name, sdl->sdl_data, sdl->sdl_nlen);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_linux.c:504:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(ifr.ifr_name, nic_name, sizeof(ifr.ifr_name));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_osx.c:1354:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(ifc_name, sdl->sdl_data, sdl->sdl_nlen);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_posix.c:359:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(lifr.lifr_name, nic_name, sizeof(lifr.lifr_name));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_posix.c:362:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(ifr.ifr_name, nic_name, sizeof(ifr.ifr_name));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_posix.c:401:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(ifr.ifr_name, nic_name, sizeof(ifr.ifr_name));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_posix.c:581:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(ifr.ifr_name, nic_name, sizeof(ifr.ifr_name));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:75:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    nbytes = read(fd, fstruct, size);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:145:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        item_length = strlen(array[i]) + 1;
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:166:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        item_length = strlen(array[i]);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:208:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (info.pr_argc && strlen(info.pr_psargs) == PRARGSZ-1) {
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:923:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(p->pr_mapname) > 0) {
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:1027:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(ifr.lifr_name, ksp->ks_name, sizeof(ifr.lifr_name));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_sunos.c:1518:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(ifr.lifr_name, ksp->ks_name, sizeof(ifr.lifr_name));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_windows.c:904:52:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    py_domain = PyUnicode_FromWideChar(domainName, wcslen(domainName));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_windows.c:907:48:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    py_username = PyUnicode_FromWideChar(name, wcslen(name));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_windows.c:1273:59:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        py_username = PyUnicode_FromWideChar(buffer_user, wcslen(buffer_user));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/_psutil_windows.c:1398:45:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                            wcslen(mappedFileName));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/aix/common.c:26:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    br = read(Kd, buf, len);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.c:210:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            pos = pos + strlen(&argstr[pos]) + 1;
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.c:260:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (size == 0 || strlen(pathname) == 0) {
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.c:267:13:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
            strcpy(pathname, "");
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/freebsd/specific.c:775:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(kve->kve_path) == 0) {
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/netbsd/specific.c:422:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            pos = pos + strlen(&argstr[pos]) + 1;
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/osx/process_info.c:181:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(arg_ptr);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/solaris/environ.c:106:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        r = read(fd, buf, sizeof(buf));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/solaris/environ.c:260:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        r = read(fd, buf, ptr_size);
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/disk.c:315:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(opts) > 0)
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/net.c:110:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            wcslen(pCurrAddresses->FriendlyName));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/net.c:181:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            wcslen(pCurrAddresses->FriendlyName));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/net.c:388:21:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    wcslen(pCurrAddresses->FriendlyName));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_handles.c:252:46:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                             wcslen(globalFileName->Buffer));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_info.c:446:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size = wcslen(tmp->Buffer) + 1;
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_info.c:513:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            wcslen(szArglist[i]));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/process_info.c:543:40:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ret = PyUnicode_FromWideChar(data, wcslen(data));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/services.c:144:41:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            lpService[i].lpServiceName, wcslen(lpService[i].lpServiceName));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/services.c:150:41:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            lpService[i].lpDisplayName, wcslen(lpService[i].lpDisplayName));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/services.c:226:29:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        qsc->lpDisplayName, wcslen(qsc->lpDisplayName));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/services.c:232:32:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        qsc->lpBinaryPathName, wcslen(qsc->lpBinaryPathName));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/services.c:238:34:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        qsc->lpServiceStartName, wcslen(qsc->lpServiceStartName));
data/mozjs78-78.4.0/third_party/python/psutil/psutil/arch/windows/services.c:395:34:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            scd->lpDescription,  wcslen(scd->lpDescription));
data/mozjs78-78.4.0/third_party/python/pyyaml/ext/_yaml.c:612:87:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define __Pyx_PyByteArray_FromString(s) PyByteArray_FromStringAndSize((const char*)s, strlen((const char*)s))
data/mozjs78-78.4.0/third_party/python/pyyaml/ext/_yaml.c:732:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    __PYX_DEFAULT_STRING_ENCODING = (char*) malloc(strlen(default_encoding_c));
data/mozjs78-78.4.0/third_party/python/pyyaml/ext/_yaml.c:28997:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return __Pyx_PyUnicode_FromStringAndSize(c_str, (Py_ssize_t)strlen(c_str));
data/mozjs78-78.4.0/third_party/python/pyyaml/ext/_yaml.h:6:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define PyUnicode_FromString(s) PyUnicode_DecodeUTF8((s), strlen(s), "strict")
data/mozjs78-78.4.0/third_party/python/scandir/_scandir.c:65:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define NAMLEN(dirent) strlen((dirent)->d_name)
data/mozjs78-78.4.0/third_party/python/scandir/_scandir.c:69:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define NAMLEN(dirent) strlen((dirent)->d_name)
data/mozjs78-78.4.0/third_party/python/scandir/_scandir.c:807:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (wcslen(wide) != length) {
data/mozjs78-78.4.0/third_party/python/scandir/_scandir.c:872:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((size_t)length != strlen(narrow)) {
data/mozjs78-78.4.0/third_party/python/scandir/_scandir.c:1368:20:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        path_len = wcslen(path_wide);
data/mozjs78-78.4.0/third_party/python/scandir/_scandir.c:1372:27:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size = path_len + 1 + wcslen(filename) + 1;
data/mozjs78-78.4.0/third_party/python/scandir/_scandir.c:1408:60:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    entry->name = PyUnicode_FromWideChar(dataW->cFileName, wcslen(dataW->cFileName));
data/mozjs78-78.4.0/third_party/python/scandir/_scandir.c:1416:55:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    entry->path = PyUnicode_FromWideChar(joined_path, wcslen(joined_path));
data/mozjs78-78.4.0/third_party/python/scandir/_scandir.c:1445:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        path_len = strlen(path_narrow);
data/mozjs78-78.4.0/third_party/python/scandir/_scandir.c:1449:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        filename_len = strlen(filename);
data/mozjs78-78.4.0/third_party/python/scandir/_scandir.c:1495:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        entry->path = PyUnicode_Decode(joined_path, strlen(joined_path),
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-port.h:1610:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  return strncpy(dest, src, n);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-port.h:1632:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return static_cast<int>(read(fd, buf, count));
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/include/gtest/internal/gtest-string.h:200:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ConstructNonNull(a_c_str, strlen(a_c_str));
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample2.cc:42:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t len = strlen(a_c_string);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/samples/sample2.h:78:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return c_string_ == NULL ? 0 : strlen(c_string_);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-port.cc:150:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t full_regex_len = strlen(regex) + 10;
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-port.cc:404:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t len = strlen(regex);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-printers.cc:308:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    PrintCharsAsStringTo(s, strlen(s), os);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest-printers.cc:325:33:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    PrintWideCharsAsStringTo(s, wcslen(s), os);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:851:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    NULL : CloneString(c_str, strlen(c_str));
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:861:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const int length = strlen(ansi);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:1506:34:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    num_chars = static_cast<int>(wcslen(str));
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:1671:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t this_len = strlen(c_str());
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:1672:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t suffix_len = strlen(suffix);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:1684:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t this_len = strlen(c_str());
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:1685:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t suffix_len = strlen(suffix);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:3213:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      segment = next_segment + strlen("]]>");
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:3442:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  result.reserve(strlen(str) + 1);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/src/gtest.cc:4547:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t prefix_len = strlen(prefix);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/test/gtest-printers_test.cc:854:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  EXPECT_TRUE(std::equal(a, a + kSize, numbers.begin()));
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/googletest/xcode/Samples/FrameworkSample/widget.cc:60:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(buffer, name_.c_str(), max_size-1);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_alsa.c:522:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (read(ctx->control_fd_read, &dummy, 1) < 0) {
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_audiounit.cpp:3079:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!strlen(*name)) { // empty string.
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_audiounit.cpp:3349:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  strlen(PRIVATE_AGGREGATE_DEVICE_NAME));
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_log.cpp:43:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t length = strlen(str);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_sun.c:489:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if ((n = read(s->record.fd, s->record.buf + read_ofs, bytes)) < 0) {
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_wasapi.cpp:1124:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  XASSERT(read >= 0);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/src/cubeb_wasapi.cpp:2134:20:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = wcslen(stm->input_device.get());
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/common.h:37:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
  usleep(ms % 1000 * 1000);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_deadlock.cpp:123:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(10000);
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/test/test_deadlock.cpp:161:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(1000); // Force to switch threads by sleeping 1 ms.
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/tools/cubeb-test.cpp:376:9:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = getchar();
data/mozjs78-78.4.0/third_party/rust/cubeb-sys/libcubeb/tools/cubeb-test.cpp:553:35:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  } while (choose_action(cl, &op, getchar()));
data/mozjs78-78.4.0/third_party/rust/encoding_c/include/encoding_rs_cpp.h:882:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    const auto [result, read, written, had_errors] = decoder->decode_to_utf8(
data/mozjs78-78.4.0/third_party/rust/encoding_c/include/encoding_rs_cpp.h:921:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    const auto [result, read, written] =
data/mozjs78-78.4.0/third_party/rust/encoding_c/include/encoding_rs_cpp.h:1031:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    const auto [result, read, written, had_errors] = decoder->decode_to_utf16(
data/mozjs78-78.4.0/third_party/rust/encoding_c/include/encoding_rs_cpp.h:1067:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    const auto [result, read, written] =
data/mozjs78-78.4.0/third_party/rust/encoding_c/include/encoding_rs_cpp.h:1119:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      const auto [result, read, written, had_errors] =
data/mozjs78-78.4.0/third_party/rust/encoding_c/include/encoding_rs_cpp.h:1123:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      total_read += read;
data/mozjs78-78.4.0/third_party/rust/encoding_c/include/encoding_rs_cpp.h:1177:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      const auto [result, read, written, had_errors] =
data/mozjs78-78.4.0/third_party/rust/encoding_c/include/encoding_rs_cpp.h:1181:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      total_read += read;
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/contrib/glslopt/Main.cpp:58:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int size = (int)strlen(data);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/contrib/glslopt/Main.cpp:146:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		dest = (char *) calloc(strlen(source)+5, sizeof(char));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/contrib/glslopt/Main.cpp:147:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		snprintf(dest, strlen(source)+5, "%s.out", source);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:4962:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strncmp(this->type->specifier->type_name, "image", strlen("image")) == 0) {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:4966:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      } else if (strncmp(this->type->specifier->type_name, "uimage", strlen("uimage")) == 0) {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:4970:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      } else if (strncmp(this->type->specifier->type_name, "iimage", strlen("iimage")) == 0) {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:6748:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
               ? equal(cnst, state->switch_state.test_var)
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:6749:32:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
               : logic_or(cmp, equal(cnst, state->switch_state.test_var));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ast_to_hir.cpp:6925:47:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                       logic_or(fallthru_var, equal(label, deref_test_var))));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_functions.cpp:1069:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
   BA1(equal);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_functions.cpp:2076:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
   FIUBD_VEC(equal)
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_functions.cpp:5046:30:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
   ir_expression *tan = csel(equal(abs(x), abs(y)),
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_functions.cpp:5421:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
   body.emit(ret(equal(abs(x), imm(type, infinities))));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_int64.h:85:33:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
   ir_expression *const r0014 = equal(swizzle_y(r000D), body.constant(0u));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_int64.h:299:33:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
   ir_expression *const r003E = equal(swizzle_y(r0036), body.constant(0u));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_int64.h:523:33:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
   ir_expression *const r0071 = equal(swizzle_y(r0067), body.constant(0u));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_int64.h:757:33:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
   ir_expression *const r009F = equal(swizzle_y(r0097), body.constant(0u));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/builtin_int64.h:987:33:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
   ir_expression *const r00D4 = equal(swizzle_y(r00CA), body.constant(0u));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp-lex.c:1199:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			     (c = getc( yyin )) != EOF && c != '\n'; ++n ) \
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp-lex.c:2747:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return yy_scan_bytes( yystr, (int) strlen(yystr) , yyscanner);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp-parse.c:1253:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#   define yystrlen strlen
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/glcpp-parse.c:1974:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		char *path = strndup(start + 1, strlen(start + 1) - 1);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glcpp/pp.c:165:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	separator_len = strlen(newline_separator);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_lexer.cpp:1772:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			     (c = getc( yyin )) != EOF && c != '\n'; ++n ) \
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_lexer.cpp:3066:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    char suffix = yytext[strlen(yytext) - 1];
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_lexer.cpp:4291:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return yy_scan_bytes( yystr, (int) strlen(yystr) , yyscanner);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_parser.cpp:1901:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#   define yystrlen strlen
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_parser_extras.cpp:498:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int msg_offset = strlen(state->info_log);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/glsl_parser_extras.cpp:2122:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         disk_cache_compute_key(ctx->Cache, source, strlen(source),
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir.cpp:1767:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              strlen(name) < ARRAY_SIZE(this->name_storage)) {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_builder.cpp:354:1:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
equal(operand a, operand b)
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_builder.h:161:16:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
ir_expression *equal(operand a, operand b);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_reader.cpp:37:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   void read(exec_list *instructions, const char *src, bool scan_for_protos);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_reader.cpp:84:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   r.read(instructions, src, scan_for_protos);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_reader.cpp:88:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ir_reader::read(exec_list *instructions, const char *src, bool scan_for_protos)
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_reader.cpp:608:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      unsigned mask_length = strlen(mask_str);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/ir_reader.cpp:771:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(swiz->value()) > 4) {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniform_blocks.cpp:130:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         unsigned len = strlen(close_bracket + 1) + 1;
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniform_blocks.cpp:377:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            size_t name_length = strlen(name);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniforms.cpp:67:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      name_size = strlen(name);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniforms.cpp:85:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return strndup(first_dot+1, strlen(first_dot) - 1);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniforms.cpp:107:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int name_length = strlen(interface_name) + 1 + strlen(field_name) + 1;
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniforms.cpp:107:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int name_length = strlen(interface_name) + 1 + strlen(field_name) + 1;
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniforms.cpp:273:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   recursion(type, &name_copy, strlen(name), false, NULL, packing, false,
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniforms.cpp:309:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      recursion(var->type, &name, strlen(name), row_major, NULL, packing,
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniforms.cpp:318:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      recursion(t, &name, strlen(name), row_major, NULL, packing,
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniforms.cpp:745:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            unsigned l = strlen(var->get_interface_type()->name);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniforms.cpp:841:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            memmove(str_start, str_end + 1, 1 + strlen(str_end + 1));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniforms.cpp:1323:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            const ptrdiff_t len = strlen(var->get_interface_type()->name);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_uniforms.cpp:1360:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const unsigned l = strlen(var->name);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/link_varyings.cpp:181:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         create_xfb_varying_names(mem_ctx, type, &name, strlen(name), &i,
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/linker.cpp:511:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   const size_t len = strlen(name);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/linker.cpp:3608:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            unsigned baselen = strlen(var->name);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_blend_equation_advanced.cpp:272:11:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
   return equal(mode, new(ralloc_parent(mode)) ir_constant(unsigned(q)));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_blend_equation_advanced.cpp:311:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
   f.emit(if_tree(equal(dst_alpha, imm1(0)),
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_blend_equation_advanced.cpp:313:43:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                     assign(dst_rgb, csel(equal(swizzle_xyz(fb),
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_blend_equation_advanced.cpp:319:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
   f.emit(if_tree(equal(src_alpha, imm1(0)),
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_blend_equation_advanced.cpp:321:43:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                     assign(src_rgb, csel(equal(swizzle_xyz(src),
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_instructions.cpp:500:36:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                                   equal(resulting_biased_exp,
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_instructions.cpp:978:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
   ir->operands[0] = equal(fract(ir->operands[0]->clone(ir, NULL)),
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_instructions.cpp:980:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
   ir->operands[1] = csel(equal(fract(mul(t2, p5->clone(ir, NULL))),
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_instructions.cpp:1017:31:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                         csel(equal(frtemp, zero->clone(ir, NULL)),
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_instructions.cpp:1117:34:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      ir_expression *mask = csel(equal(bits, c32),
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_instructions.cpp:1163:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      ir->operands[0] = equal(c0, bits);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_instructions.cpp:1221:45:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
   base_ir->insert_before(assign(mask, csel(equal(bits, c32),
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_instructions.cpp:1400:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
   ir->operands[0] = equal(lsb_only, c0);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_packing_builtins.cpp:914:28:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
         if_tree(logic_and(equal(e, constant(0xffu << 23u)),
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_packing_builtins.cpp:915:38:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                           logic_not(equal(m, constant(0u)))),
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_packing_builtins.cpp:1169:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
         if_tree(equal(e, constant(0u)),
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_packing_builtins.cpp:1204:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
         if_tree(equal(m, constant(0u)),
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_subroutine.cpp:115:32:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
         last_branch = if_tree(equal(subr_to_int(var), lc), new_call);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_subroutine.cpp:117:32:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
         last_branch = if_tree(equal(subr_to_int(var), lc), new_call, last_branch);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_ubo_reference.cpp:199:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            base_length = strlen(name_copy);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_variable_index_to_cond_assign.cpp:101:37:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
   ir_rvalue *const condition_val = equal(broadcast_index, test_indices);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_vector_derefs.cpp:118:46:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                                             equal(arr_index, cmp_index),
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_vector_derefs.cpp:125:46:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                                             equal(arr_index, cmp_index));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/lower_vector_insert.cpp:124:30:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                             equal(expr->operands[2]->clone(factory.mem_ctx,
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_copy_propagation_elements.cpp:127:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   acp_entry *read(ir_variable *var)
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_copy_propagation_elements.cpp:333:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   const acp_entry *entry = state->read(ir->var);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/opt_copy_propagation_elements.cpp:451:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   const acp_entry *entry = state->read(var);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/shader_cache.cpp:208:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   disk_cache_compute_key(cache, buf, strlen(buf), prog->data->sha1);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/standalone.cpp:473:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const unsigned len = strlen(files[i]);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/standalone.cpp:503:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(shader->InfoLog) > 0) {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl/standalone.cpp:563:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(whole_program->data->InfoLog) > 0) {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/compiler/glsl_types.cpp:551:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   const unsigned name_length = strlen(array->name) + 10 + 3;
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/blob.c:238:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return blob_write_bytes(blob, str, strlen(str) + 1);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/debug.c:46:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               if (strlen(control->string) == n &&
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/debug.c:61:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   const size_t len = strlen(s);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:404:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t id_size = strlen(driver_id) + 1;
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:405:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t gpu_name_size = strlen(gpu_name) + 1;
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:537:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            size_t len = strlen(entry->d_name);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/disk_cache.c:718:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      read_ret = read(fd, in + done, count - done);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/mesa-sha1_test.c:49:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      _mesa_sha1_compute(test_data[i].string, strlen(test_data[i].string),
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/mesa-sha1_test.c:58:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                test_data[i].string, strlen(test_data[i].string),
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:375:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   n = strlen(str);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:406:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   existing_length = strlen(*dest);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:422:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return cat(dest, str, strlen(str));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:515:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   existing_length = *str ? strlen(*str) : 0;
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:542:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      *start = strlen(*str);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:801:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   n = strlen(str);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:850:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   existing_length = *str ? strlen(*str) : 0;
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:877:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      *start = strlen(*str);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:901:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   existing_length = strlen(*dest);
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/ralloc.c:916:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return linear_cat(parent, dest, str, strlen(str));
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/string_buffer.c:79:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!_mesa_string_buffer_append_len(str, s, strlen(s))) {
data/mozjs78-78.4.0/third_party/rust/glslopt/glsl-optimizer/src/util/string_buffer.h:69:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return _mesa_string_buffer_append_len(str, c, strlen(c));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:19179:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define sqlite3Strlen30NN(C) (strlen(C)&0x3fffffff)
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:27840:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(z) + 1;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:28708:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            pAccum->nChar = 0x7fffffff & (int)strlen(bufpt);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:28728:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          length = 0x7fffffff & (int)strlen(bufpt);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:31061:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return 0x3fffffff & (int)strlen(z);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:31073:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return pCol->zName + strlen(pCol->zName) + 1;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:33711:42:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  { "read",         (sqlite3_syscall_ptr)read,       0  },
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:34259:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = (int)strlen(zAbsoluteName);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:34863:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(1000);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:36969:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for(ii=(int)strlen(zDirname); ii>0 && zDirname[ii]!='/'; ii--);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:37837:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nShmFilename = 6 + (int)strlen(zBasePath);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:38905:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nFilename = (int)strlen(zFilename) + 6;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:39308:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert( (flags & SQLITE_OPEN_URI) || zName[strlen(zName)+1]==0 );
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:39321:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert( zName[strlen(zName)+1]==0 );
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:39802:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
  usleep(microseconds);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40098:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  dbLen = (int)strlen(dbPath);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40119:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (int)strlen(lockPath);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40375:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(500000); /* wait 0.5 sec and try the lock again*/
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40401:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(10000000); /* wait 10 sec and try the lock again */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40550:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        writeSize = PROXY_PATHINDEX + strlen(&writeBuffer[PROXY_PATHINDEX]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40681:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(dbPath); /* Length of database filename - dbPath */
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40707:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert( (int)strlen(conchPath) == len+7 );
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40757:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert( (int)strlen((char*)pFile->lockingContext)<=MAXPATHLEN );
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40765:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen((char *)pFile->lockingContext) - strlen(DOTLOCK_SUFFIX);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40765:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen((char *)pFile->lockingContext) - strlen(DOTLOCK_SUFFIX);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:40769:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert( strlen((char*)pFile->lockingContext)<=MAXPATHLEN );
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:56206:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      z += strlen(z)+1;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:56207:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      z += strlen(z)+1;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:76520:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nByte = 0x7fffffff & (int)strlen(z);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:126681:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert( strlen(zBuf) < sizeof(zBuf)-1 );
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:140465:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert( zAff==0 || (int)strlen(zAff)>=nEq );
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:165756:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nRet = 2 + (int)strlen(zInput)*2 + 1;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166027:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nStr += strlen(zCol) + 1;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166038:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int n = (int)strlen(zCol)+1;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166104:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert( strlen(argv[0])==4 );
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166109:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nDb = (int)strlen(argv[1]) + 1;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166110:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nName = (int)strlen(argv[2]) + 1;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166144:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     && strlen(z)>8
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166179:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if( strlen(zVal)!=4 || sqlite3_strnicmp(zVal, "fts3", 4) ){
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166205:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if( (strlen(zVal)!=3 || sqlite3_strnicmp(zVal, "asc", 3)) 
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166206:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             && (strlen(zVal)!=4 || sqlite3_strnicmp(zVal, "desc", 4)) 
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166244:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nString += (int)(strlen(z) + 1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166369:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int n = (int)strlen(p->azColumn[iCol]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:166372:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if( zNot && n==(int)strlen(zNot)
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:171059:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nDb = (int)strlen(zDb);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:171063:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nDb = (int)strlen(zDb);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:171071:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nFts3 = (int)strlen(zFts3);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:171396:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      pCsr->filter.nTerm = (int)strlen(pCsr->filter.zTerm);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:171403:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    pCsr->nStop = (int)strlen(pCsr->zStop);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:172055:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int nStr = (int)strlen(zStr);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:172515:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = (int)strlen(z);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:172924:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( nKey<=0 ) nKey = (int) strlen(z);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:173315:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    c->nInput = (int)strlen(zInput);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:173777:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  *pnOut = i = (int)strlen(z);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:174055:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  zEnd = &zCopy[strlen(zCopy)];
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:174065:68:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  m = (sqlite3_tokenizer_module *)sqlite3Fts3HashFind(pHash,z,(int)strlen(z)+1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:174475:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int i, n = (int)strlen(argv[1]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:174527:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    c->nBytes = (int)strlen(pInput);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:174719:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nName = (int)strlen(zName);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:174757:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nByte += (int)(strlen(argv[i]) + 1);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:174766:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int n = (int)strlen(argv[i]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:181006:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sqlite3_int64 nStr = strlen(zMatchinfo);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:181476:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nAppend = (int)strlen(zAppend);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:182856:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int n = (int)strlen(z);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:182911:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    pCsr->nInput = (int)strlen(aInput);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:183677:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  p->nUsed += (int)strlen(p->zBuf+p->nUsed);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:185690:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          jsonAppendRaw(&x, p->zRoot, (int)strlen(p->zRoot));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:187892:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                || (idxStr && (int)strlen(idxStr)==argc*2) );
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:189753:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nDb = (int)strlen(argv[1]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:189754:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nName = (int)strlen(argv[2]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:191621:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nDb = strlen(argv[1]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:191622:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nName = strlen(argv[2]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:192993:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(argv[0])+1;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:193049:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nInput = strlen(zInput);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:194758:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if( strlen(zIn)>4 && memcmp("data", zIn, 4)==0 ){
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:194914:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t nCopy = strlen(zStr) + 1;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:195702:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if( (int)strlen(zMask)!=pIter->nTblCol ){
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:196663:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if( strlen(p->zRbu)>=5 && 0==memcmp("file:", p->zRbu, 5) ){
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:196748:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sz = (int)strlen(z)&0xffffff;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:197757:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nTarget = zTarget ? strlen(zTarget) : 0;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:197758:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nRbu = strlen(zRbu);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:197939:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int n = strlen(zState);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:197968:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t nErrmsg = strlen(p->zErrmsg);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:198810:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          nCopy = strlen(zBase);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:199055:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nName = strlen(zName);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:202732:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sessionAppendBlob(pBuf, (u8 *)pTab->zName, (int)strlen(pTab->zName)+1, pRc);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:204276:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sessionAppendBlob(&p->rebase, (u8*)zTab, (int)strlen(zTab)+1, &rc);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:204756:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nTab = (int)strlen(zTab);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:205208:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int nNew = (int)strlen(zNew);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:205656:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sessionAppendBlob(&sOut,(u8*)pIter->zTab,(int)strlen(pIter->zTab)+1,&rc);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:208898:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if( n<0 ) n = (int)strlen(z);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:209562:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nStr = (int)strlen(zStr);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:209756:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nIn = (int)strlen(pIn);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:210089:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nEnum = (int)strlen(zEnum);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:210121:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nCmd = (int)strlen(zCmd);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:210177:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sqlite3_int64 nArg = strlen(zArg) + 1;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:210307:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sqlite3_int64 nIn = strlen(zIn);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:211680:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              pExpr->pIndex, p->zTerm, (int)strlen(p->zTerm),
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:212530:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = (int)strlen(z);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:212617:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        rc = fts5ParseTokenize((void*)&sCtx, tflags, zTerm, (int)strlen(zTerm),
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:213110:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nByte += (int)strlen(pTerm->zTerm) * 2 + 3 + 2;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:213593:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int nTerm = (int)strlen(pTerm->zTerm);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:213912:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                          (int)strlen(fts5EntryKey(p)));
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:214234:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert( p->nKey+1==(int)strlen(zKey) );
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:214284:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int nTerm = (int)strlen(zKey);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:216235:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sqlite3Fts5BufferSet(&p->rc,&pIter->term, (int)strlen(zTerm), (u8*)zTerm);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:216315:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sqlite3Fts5BufferSet(&p->rc, &pIter->term, (int)strlen(zTerm),
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:216764:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = (z ? (int)strlen((const char*)z) : 0);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:218832:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      fts5WriteAppendTerm(p, &writer, (int)strlen(zTerm), (const u8*)zTerm);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:221511:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            idxStr += strlen(&idxStr[iIdxStr]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:223493:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nName = strlen(zName) + 1;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:223531:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nName = strlen(zName) + 1;
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:224110:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        iOff = (int)strlen(zDefn);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:224113:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          iOff += (int)strlen(&zDefn[iOff]);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225205:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int n = (int)strlen(z);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225582:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert( strlen(p->zSuffix)==p->nSuffix );
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:225583:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert( strlen(p->zOutput)==p->nOutput );
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:227545:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  bDb = (argc==6 && strlen(argv[1])==4 && memcmp("temp", argv[1], 4)==0);
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:227555:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int nDb = (int)strlen(zDb)+1; 
data/mozjs78-78.4.0/third_party/rust/libsqlite3-sys/sqlite3/sqlite3.c:227556:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int nTab = (int)strlen(zTab)+1;
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/blast/blast.c:458:12:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while (getchar() != EOF)
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream2/zstream.h:87:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        int read(void* buf, size_t len) {
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream2/zstream.h:115:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline int read(izstream& zs, T* x, Items items) {
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream2/zstream.h:278:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    val.byte = 255;  val.word = ::strlen(x);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:146:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(c_mode, "w");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:148:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(c_mode, "a");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:150:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(c_mode, "w");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:152:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(c_mode, "r");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:160:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(c_mode) == 0)
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/iostream3/zfstream.cc:163:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(c_mode, "b");
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/miniunz.c:143:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = (int)strlen(newdir);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/miniunz.c:390:27:  [1] (buffer) scanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
                    ret = scanf("%1s",answer);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/miniunz.c:609:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(filename_try, zipfilename,MAXFILENAME-1);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/minizip.c:111:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(f);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/minizip.c:115:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(name, f,MAXFILENAME-1);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/minizip.c:324:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(filename_try, argv[zipfilenamearg],MAXFILENAME-1);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/minizip.c:328:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len=(int)strlen(filename_try);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/minizip.c:352:27:  [1] (buffer) scanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
                    ret = scanf("%1s",answer);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/minizip.c:396:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  (strlen(argv[i]) == 2)))
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/mztools.c:151:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          int comsize = (int) strlen(comment);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/mztools.c:226:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int comsize = (int) strlen(comment);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/unzip.c:1249:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(szFileName)>=UNZ_MAXFILENAMEINZIP)
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/zip.c:962:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  uInt size_filename = (uInt)strlen(filename);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/zip.c:1101:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_comment = (uInt)strlen(comment);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/zip.c:1103:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_filename = (uInt)strlen(filename);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/minizip/zip.c:1870:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_global_comment = (uInt)strlen(global_comment);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:138:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  origlen = strlen(buffer);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:332:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = strlen(buffer);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:440:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
              strncpy(fname,buffer.header.name,SHORTNAMESIZE);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/contrib/untgz/untgz.c:514:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              if (fname[BLOCKSIZE-1] != 0 || (int)strlen(fname) > remaining)
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gun.c:103:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ret = (int)read(me->infile, next, ret);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gun.c:669:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                len = (int)strlen(*argv);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzappend.c:184:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    len = read(in->fd, in->buf, 1 << in->size);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzappend.c:356:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read(gz.fd, gz.buf, 1) != 1) bye("reading after seek on ", name);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzappend.c:375:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (read(gz.fd, gz.buf, 1) != 1) bye("reading after seek on ", name);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzappend.c:411:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        len = read(fd, in, CHUNK);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzjoin.c:131:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        len = (long)read(in->fd, in->buf + in->left, CHUNK - in->left);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzjoin.c:183:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if (read(in->fd, in->buf, 1) != 1)
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:416:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        read(log->fd, buf, HEAD + EXTRA) != HEAD + EXTRA ||
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:477:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                      read(log->fd, buf, 1) != 1))
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:583:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dest = malloc(strlen(log->path) + 1);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:631:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            dict = read(fd, buf, DICT);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:646:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            read(log->fd, buf, 1) != 1 || lseek(log->fd, -1, SEEK_CUR) < 0) {
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:678:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            read(log->fd, buf, 1) != 1)
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:762:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            ret = (size_t)read(fd, data, len) != len;
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:882:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(path);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:939:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if (read(log->fd, buf, 5) != 5)
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/gzlog.c:943:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                read(log->fd, (char *)data + next, block) != block)
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/examples/zran.c:281:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ret = getc(in);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzguts.h:48:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#  define read _read
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzlib.c:199:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen((const char *)path);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzlib.c:605:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((state->msg = (char *)malloc(strlen(state->path) + strlen(msg) + 3)) ==
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzlib.c:605:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((state->msg = (char *)malloc(strlen(state->path) + strlen(msg) + 3)) ==
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzlib.c:611:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (void)snprintf(state->msg, strlen(state->path) + strlen(msg) + 3,
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzlib.c:611:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (void)snprintf(state->msg, strlen(state->path) + strlen(msg) + 3,
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzread.c:35:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ret = read(state->fd, buf + *have, get);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzwrite.c:370:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(str);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzwrite.c:426:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(next);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/gzwrite.c:524:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(next);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/example.c:93:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    uLong len = (uLong)strlen(hello)+1;
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/example.c:123:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (int)strlen(hello)+1;
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/example.c:180:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen((char*)uncompr) != 7) { /* " hello!" */
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/example.c:206:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    uLong len = (uLong)strlen(hello)+1;
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/example.c:381:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    uInt len = (uInt)strlen(hello)+1;
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/example.c:480:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    c_stream.avail_in = (uInt)strlen(hello)+1;
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/infcover.c:250:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    in = malloc((strlen(hex) + 1) >> 1);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/infcover.c:525:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    prefix = malloc(strlen(id) + 6);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:465:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(file) + strlen(GZ_SUFFIX) >= sizeof(outfile)) {
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:465:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(file) + strlen(GZ_SUFFIX) >= sizeof(outfile)) {
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:503:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    unsigned len = strlen(file);
data/mozjs78-78.4.0/third_party/rust/libz-sys/src/zlib/test/minigzip.c:505:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (len + strlen(GZ_SUFFIX) >= sizeof(buf)) {
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:4177:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fname->mn_len = strlen(path);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:9339:18:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
	my.mc_wbuf[0] = memalign(env->me_os_psize, MDB_WBUF*2);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb.c:9759:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(name);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb_load.c:184:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(stdin);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb_load.c:209:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen((char *)c1);
data/mozjs78-78.4.0/third_party/rust/lmdb-rkv-sys/lmdb/libraries/liblmdb/mdb_load.c:229:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen((char *)c1);
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/examples/pseudoquine.c:11:14:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    char c = fgetc(self);
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/examples/pseudoquine.c:16:13:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        c = fgetc(self);
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/follow_symlink.c:9:14:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    char c = fgetc(file);
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/follow_symlink.c:12:13:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        c = fgetc(file);
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/fs.c:126:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    res = fgetc(fp);
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/read_file.c:9:14:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    char c = fgetc(file);
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/read_file.c:12:13:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        c = fgetc(file);
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/read_file_twice.c:10:18:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        char c = fgetc(file);
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/read_file_twice.c:13:17:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            c = fgetc(file);
data/mozjs78-78.4.0/third_party/rust/lucet-wasi/tests/guests/write_file.c:13:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(nwritten == strlen(message));
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_containers.hpp:650:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		append(s, strlen(s));
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_cross_containers.hpp:657:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		append(s, strlen(s));
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_glsl.cpp:9428:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
			GLSL_BFOP_CAST(equal, int_type);
data/mozjs78-78.4.0/third_party/rust/spirv-cross-internal/src/vendor/SPIRV-Cross/spirv_glsl.cpp:9438:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
			GLSL_BFOP(equal);
data/mozjs78-78.4.0/tools/fuzzing/interface/FuzzingInterface.h:61:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    is.read(buf, len);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerDriver.cpp:99:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    MaxFlagLen = std::max(strlen(FlagDescriptions[F].Name), MaxFlagLen);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerDriver.cpp:105:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (size_t i = 0, n = MaxFlagLen - strlen(D.Name); i < n; i++)
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerDriver.cpp:115:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t Len = strlen(Name);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIO.cpp:50:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  T.read(reinterpret_cast<char *>(Res.data()), FileLen);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIOPosix.cpp:163:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  mozilla::Unused << write(2, Str, strlen(Str));
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIOWindows.cpp:128:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t FilenameLen = strlen(FindInfo.cFileName);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIOWindows.cpp:297:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t Len = strlen(Patt);
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerIOWindows.cpp:395:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _write(2, Str, strlen(Str));
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerTracePC.cpp:668:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fuzzer::TPC.MMT.Add(reinterpret_cast<const uint8_t *>(s2), strlen(s2));
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerTracePC.cpp:675:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fuzzer::TPC.MMT.Add(reinterpret_cast<const uint8_t *>(s2), strlen(s2));
data/mozjs78-78.4.0/tools/fuzzing/libfuzzer/FuzzerUtilFuchsia.cpp:78:48:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  } while(!FD_ISSET(STDIN_FILENO, &readfds) || getchar() != 0x03);

ANALYSIS SUMMARY:

Hits = 7535
Lines analyzed = 2577444 in approximately 68.20 seconds (37795 lines/second)
Physical Source Lines of Code (SLOC) = 1702224
Hits@level = [0] 7370 [1] 1472 [2] 3627 [3] 336 [4] 2082 [5]  18
Hits@level+ = [0+] 14905 [1+] 7535 [2+] 6063 [3+] 2436 [4+] 2100 [5+]  18
Hits/KSLOC@level+ = [0+] 8.75619 [1+] 4.42656 [2+] 3.56181 [3+] 1.43107 [4+] 1.23368 [5+] 0.0105744
Dot directories skipped = 14 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.