Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/pccts-1.33MR33/antlr/antlr.c Examining data/pccts-1.33MR33/antlr/bits.c Examining data/pccts-1.33MR33/antlr/build.c Examining data/pccts-1.33MR33/antlr/dumpcycles.c Examining data/pccts-1.33MR33/antlr/dumpnode.c Examining data/pccts-1.33MR33/antlr/egman.c Examining data/pccts-1.33MR33/antlr/err.c Examining data/pccts-1.33MR33/antlr/fcache.c Examining data/pccts-1.33MR33/antlr/fset.c Examining data/pccts-1.33MR33/antlr/fset2.c Examining data/pccts-1.33MR33/antlr/generic.h Examining data/pccts-1.33MR33/antlr/globals.c Examining data/pccts-1.33MR33/antlr/hash.c Examining data/pccts-1.33MR33/antlr/hash.h Examining data/pccts-1.33MR33/antlr/lex.c Examining data/pccts-1.33MR33/antlr/main.c Examining data/pccts-1.33MR33/antlr/misc.c Examining data/pccts-1.33MR33/antlr/mode.h Examining data/pccts-1.33MR33/antlr/mrhoist.c Examining data/pccts-1.33MR33/antlr/pred.c Examining data/pccts-1.33MR33/antlr/proto.h Examining data/pccts-1.33MR33/antlr/scan.c Examining data/pccts-1.33MR33/antlr/stdpccts.h Examining data/pccts-1.33MR33/antlr/syn.h Examining data/pccts-1.33MR33/antlr/tokens.h Examining data/pccts-1.33MR33/antlr/gen.c Examining data/pccts-1.33MR33/dlg/automata.c Examining data/pccts-1.33MR33/dlg/dlg.h Examining data/pccts-1.33MR33/dlg/dlg_a.c Examining data/pccts-1.33MR33/dlg/dlg_p.c Examining data/pccts-1.33MR33/dlg/err.c Examining data/pccts-1.33MR33/dlg/main.c Examining data/pccts-1.33MR33/dlg/mode.h Examining data/pccts-1.33MR33/dlg/output.c Examining data/pccts-1.33MR33/dlg/relabel.c Examining data/pccts-1.33MR33/dlg/stdpccts.h Examining data/pccts-1.33MR33/dlg/support.c Examining data/pccts-1.33MR33/dlg/tokens.h Examining data/pccts-1.33MR33/h/antlr.h Examining data/pccts-1.33MR33/h/AParser.cpp Examining data/pccts-1.33MR33/h/AParser.h Examining data/pccts-1.33MR33/h/ast.c Examining data/pccts-1.33MR33/h/ast.h Examining data/pccts-1.33MR33/h/ASTBase.cpp Examining data/pccts-1.33MR33/h/ASTBase.h Examining data/pccts-1.33MR33/h/AToken.h Examining data/pccts-1.33MR33/h/ATokenBuffer.cpp Examining data/pccts-1.33MR33/h/ATokenBuffer.h Examining data/pccts-1.33MR33/h/ATokenStream.h Examining data/pccts-1.33MR33/h/ATokPtr.h Examining data/pccts-1.33MR33/h/ATokPtrImpl.h Examining data/pccts-1.33MR33/h/BufFileInput.cpp Examining data/pccts-1.33MR33/h/BufFileInput.h Examining data/pccts-1.33MR33/h/charbuf.h Examining data/pccts-1.33MR33/h/charptr.c Examining data/pccts-1.33MR33/h/charptr.h Examining data/pccts-1.33MR33/h/config.h Examining data/pccts-1.33MR33/h/DLexer.h Examining data/pccts-1.33MR33/h/DLexerBase.cpp Examining data/pccts-1.33MR33/h/DLexerBase.h Examining data/pccts-1.33MR33/h/dlgauto.h Examining data/pccts-1.33MR33/h/dlgdef.h Examining data/pccts-1.33MR33/h/DLG_stream_input.h Examining data/pccts-1.33MR33/h/err.h Examining data/pccts-1.33MR33/h/int.h Examining data/pccts-1.33MR33/h/PBlackBox.h Examining data/pccts-1.33MR33/h/PCCTSAST.cpp Examining data/pccts-1.33MR33/h/PCCTSAST.h Examining data/pccts-1.33MR33/h/pcctscfg.h Examining data/pccts-1.33MR33/h/pccts_assert.h Examining data/pccts-1.33MR33/h/pccts_iostream.h Examining data/pccts-1.33MR33/h/pccts_istream.h Examining data/pccts-1.33MR33/h/pccts_setjmp.h Examining data/pccts-1.33MR33/h/pccts_stdarg.h Examining data/pccts-1.33MR33/h/pccts_stdio.h Examining data/pccts-1.33MR33/h/pccts_stdlib.h Examining data/pccts-1.33MR33/h/pccts_string.h Examining data/pccts-1.33MR33/h/slist.cpp Examining data/pccts-1.33MR33/h/SList.h Examining data/pccts-1.33MR33/sorcerer/cpp.c Examining data/pccts-1.33MR33/sorcerer/err.c Examining data/pccts-1.33MR33/sorcerer/gen.c Examining data/pccts-1.33MR33/sorcerer/globals.c Examining data/pccts-1.33MR33/sorcerer/h/astlib.h Examining data/pccts-1.33MR33/sorcerer/h/SASTBase.h Examining data/pccts-1.33MR33/sorcerer/h/SCommonAST.h Examining data/pccts-1.33MR33/sorcerer/h/sintstack.h Examining data/pccts-1.33MR33/sorcerer/h/sorcerer.h Examining data/pccts-1.33MR33/sorcerer/h/sorlist.h Examining data/pccts-1.33MR33/sorcerer/h/sstack.h Examining data/pccts-1.33MR33/sorcerer/h/STreeParser.h Examining data/pccts-1.33MR33/sorcerer/hash.c Examining data/pccts-1.33MR33/sorcerer/hash.h Examining data/pccts-1.33MR33/sorcerer/lib/CASTBase.h Examining data/pccts-1.33MR33/sorcerer/lib/errsupport.c Examining data/pccts-1.33MR33/sorcerer/lib/sorcerer.c Examining data/pccts-1.33MR33/sorcerer/lib/sstack.c Examining data/pccts-1.33MR33/sorcerer/lib/STreeParser.cpp Examining data/pccts-1.33MR33/sorcerer/lib/sintstack.c Examining data/pccts-1.33MR33/sorcerer/lib/sorlist.c Examining data/pccts-1.33MR33/sorcerer/lib/astlib.c Examining data/pccts-1.33MR33/sorcerer/look.c Examining data/pccts-1.33MR33/sorcerer/main.c Examining data/pccts-1.33MR33/sorcerer/mode.h Examining data/pccts-1.33MR33/sorcerer/proto.h Examining data/pccts-1.33MR33/sorcerer/scan.c Examining data/pccts-1.33MR33/sorcerer/sor.h Examining data/pccts-1.33MR33/sorcerer/stdpccts.h Examining data/pccts-1.33MR33/sorcerer/sym.h Examining data/pccts-1.33MR33/sorcerer/test/test6.c Examining data/pccts-1.33MR33/sorcerer/test/test7/main.c Examining data/pccts-1.33MR33/sorcerer/test/test7/stdpccts.h Examining data/pccts-1.33MR33/sorcerer/test/test7/test7.c Examining data/pccts-1.33MR33/sorcerer/test/tokens6.h Examining data/pccts-1.33MR33/sorcerer/testcpp/test4/AST.h Examining data/pccts-1.33MR33/sorcerer/testcpp/test4/main.cpp Examining data/pccts-1.33MR33/sorcerer/testcpp/test4/SimpleTreeParser.cpp Examining data/pccts-1.33MR33/sorcerer/testcpp/test4/SimpleTreeParser.h Examining data/pccts-1.33MR33/sorcerer/testcpp/token3.h Examining data/pccts-1.33MR33/sorcerer/tokens.h Examining data/pccts-1.33MR33/sorcerer/sor.c Examining data/pccts-1.33MR33/support/DECmms/genmms.c Examining data/pccts-1.33MR33/support/genmk/genmk_old.c Examining data/pccts-1.33MR33/support/genmk/genmk.c Examining data/pccts-1.33MR33/support/rexpr/rexpr.c Examining data/pccts-1.33MR33/support/rexpr/rexpr.h Examining data/pccts-1.33MR33/support/rexpr/test.c Examining data/pccts-1.33MR33/support/set/set.c Examining data/pccts-1.33MR33/support/set/set.h Examining data/pccts-1.33MR33/support/sym/sym.c Examining data/pccts-1.33MR33/support/sym/template.h Examining data/pccts-1.33MR33/testcpp/11/input.h Examining data/pccts-1.33MR33/testcpp/2/MyLexer.cpp Examining data/pccts-1.33MR33/testcpp/2/MyLexer.h Examining data/pccts-1.33MR33/testcpp/3/MyLexer.cpp Examining data/pccts-1.33MR33/testcpp/3/MyLexer.h Examining data/pccts-1.33MR33/testcpp/3/mytokens.h Examining data/pccts-1.33MR33/testcpp/4/mytokens.h Examining data/pccts-1.33MR33/testcpp/5/input.h Examining data/pccts-1.33MR33/testcpp/6/main.cpp Examining data/pccts-1.33MR33/testcpp/8/main.cpp FINAL RESULTS: data/pccts-1.33MR33/antlr/antlr.c:88:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(HdrAction, LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:102:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(FirstAction, LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:436:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(CurrentClassName, name); data/pccts-1.33MR33/antlr/antlr.c:459:25: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). /* MR22 */ strcpy(BaseClassName,LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:570:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(pdecl, LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:592:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ret, LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:691:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(a, LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:752:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(a, LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:786:18: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). /* MR1 */ strcpy(a, LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:822:18: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). /* MR1 */ strcpy(a, LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:870:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(CurPredName,name); data/pccts-1.33MR33/antlr/antlr.c:1604:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(a, LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:2361:19: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(a, LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:2429:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(a, LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:2518:55: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). /* MR21 */ strcpy(pFirstSetSymbol, LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:2531:53: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). /* MR21 */ strcpy(pFirstSetSymbol, LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:2632:31: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(a, LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:2890:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(a, LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:2996:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_retv->signalname, LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:3006:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_retv->signalname, LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:3026:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_retv->action, LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:3551:1: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[CurFile]!=NULL?FileStr[CurFile]:"stdin", zzline); data/pccts-1.33MR33/antlr/bits.c:78:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(f, format, (wd&byte_mask[i])>>(i*BitsPerByte)); data/pccts-1.33MR33/antlr/build.c:65:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(q, parm); data/pccts-1.33MR33/antlr/build.c:105:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(a->action, action); data/pccts-1.33MR33/antlr/fset.c:537:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[predicate->source->file], data/pccts-1.33MR33/antlr/fset.c:540:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[predicate->source->file], data/pccts-1.33MR33/antlr/fset.c:544:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[predicate->source->file], data/pccts-1.33MR33/antlr/fset.c:547:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[predicate->source->file], data/pccts-1.33MR33/antlr/fset.c:598:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[alt1->file], alt1->line); data/pccts-1.33MR33/antlr/fset.c:619:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[alt2->file], alt2->line); data/pccts-1.33MR33/antlr/fset.c:643:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[alt1->file], alt1->line); data/pccts-1.33MR33/antlr/fset.c:657:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[alt2->file], alt2->line); data/pccts-1.33MR33/antlr/fset.c:697:9: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[parentRule->file],parentRule->line); data/pccts-1.33MR33/antlr/fset.c:723:8: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr,FileStr[parentRule->file],parentRule->line); data/pccts-1.33MR33/antlr/fset.c:735:6: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[parentRule->file], parentRule->line); data/pccts-1.33MR33/antlr/fset.c:759:11: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[parentRule->file], parentRule->line); data/pccts-1.33MR33/antlr/fset.c:772:11: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[parentRule->file], parentRule->line); data/pccts-1.33MR33/antlr/fset.c:837:11: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[parentRule->file], parentRule->line); data/pccts-1.33MR33/antlr/fset.c:850:11: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[parentRule->file], parentRule->line); data/pccts-1.33MR33/antlr/fset.c:1030:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[alt1->file], alt1->line); data/pccts-1.33MR33/antlr/fset.c:1077:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[alt1->file], alt1->line); data/pccts-1.33MR33/antlr/fset.c:1128:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[alt1->file], alt1->line); data/pccts-1.33MR33/antlr/fset.c:1239:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[alt1->file], alt1->line); data/pccts-1.33MR33/antlr/fset.c:1357:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[alt1->file], alt1->line); data/pccts-1.33MR33/antlr/fset2.c:247:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[CurAmbigfile], CurAmbigline); data/pccts-1.33MR33/antlr/fset2.c:258:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[CurAmbigfile], CurAmbigline); data/pccts-1.33MR33/antlr/fset2.c:1246:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[CurAmbigfile], CurAmbigline); data/pccts-1.33MR33/antlr/fset2.c:1871:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stdout, data/pccts-1.33MR33/antlr/fset2.c:1968:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stdout, data/pccts-1.33MR33/antlr/fset2.c:2213:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stdout,TerminalString(tn->token)); data/pccts-1.33MR33/antlr/gen.c:153:26: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define gen(s) {tab(); fprintf(output, s);} data/pccts-1.33MR33/antlr/gen.c:154:28: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define gen1(s,a) {tab(); fprintf(output, s,a);} data/pccts-1.33MR33/antlr/gen.c:155:30: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define gen2(s,a,b) {tab(); fprintf(output, s,a,b);} data/pccts-1.33MR33/antlr/gen.c:156:31: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define gen3(s,a,b,c) {tab(); fprintf(output, s,a,b,c);} data/pccts-1.33MR33/antlr/gen.c:157:33: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define gen4(s,a,b,c,d) {tab(); fprintf(output, s,a,b,c,d);} data/pccts-1.33MR33/antlr/gen.c:158:35: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define gen5(s,a,b,c,d,e) {tab(); fprintf(output, s,a,b,c,d,e);} data/pccts-1.33MR33/antlr/gen.c:159:37: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define gen6(s,a,b,c,d,e,f) {tab(); fprintf(output, s,a,b,c,d,e,f);} data/pccts-1.33MR33/antlr/gen.c:160:39: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define gen7(s,a,b,c,d,e,f,g) {tab(); fprintf(output, s,a,b,c,d,e,f,g);} data/pccts-1.33MR33/antlr/gen.c:162:20: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define _gen(s) {fprintf(output, s);} data/pccts-1.33MR33/antlr/gen.c:163:22: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define _gen1(s,a) {fprintf(output, s,a);} data/pccts-1.33MR33/antlr/gen.c:164:23: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define _gen2(s,a,b) {fprintf(output, s,a,b);} data/pccts-1.33MR33/antlr/gen.c:165:25: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define _gen3(s,a,b,c) {fprintf(output, s,a,b,c);} data/pccts-1.33MR33/antlr/gen.c:166:26: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define _gen4(s,a,b,c,d){fprintf(output, s,a,b,c,d);} data/pccts-1.33MR33/antlr/gen.c:167:28: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define _gen5(s,a,b,c,d,e){fprintf(output, s,a,b,c,d,e);} data/pccts-1.33MR33/antlr/gen.c:168:30: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define _gen6(s,a,b,c,d,e,f){fprintf(output, s,a,b,c,d,e,f);} data/pccts-1.33MR33/antlr/gen.c:169:32: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define _gen7(s,a,b,c,d,e,f,g){fprintf(output, s,a,b,c,d,e,f,g);} data/pccts-1.33MR33/antlr/gen.c:2305:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%s_set", TokenString(p->token)); data/pccts-1.33MR33/antlr/gen.c:2306:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(bufErrSet, "%s_errset", TokenString(p->token)); /* MR23 */ data/pccts-1.33MR33/antlr/gen.c:2328:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%s_setbar", TokenString(p->token)); data/pccts-1.33MR33/antlr/gen.c:2329:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(bufErrSet, "%s_errsetbar", TokenString(p->token)); /* MR23 */ data/pccts-1.33MR33/antlr/gen.c:4521:6: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(file, LineInfoFormatStr,line,fileName); data/pccts-1.33MR33/antlr/gen.c:4524:6: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(file, LineInfoFormatStr,line,prevFileNameMS); data/pccts-1.33MR33/antlr/lex.c:709:12: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. /* MR26 */ fprintf(output,strBetween(pSymbol, t, pSeparator)); data/pccts-1.33MR33/antlr/lex.c:774:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(f,strBetween(pDataType, pSymbol, pSeparator)); data/pccts-1.33MR33/antlr/lex.c:855:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(f,strBetween(pDataType, pSymbol, pSeparator)); data/pccts-1.33MR33/antlr/lex.c:857:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(f,strBetween(pSymbol, pEqualSign, pSeparator)); data/pccts-1.33MR33/antlr/main.c:160:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(Fn_in_Fl, one_fn); data/pccts-1.33MR33/antlr/main.c:827:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Parser_h_Name, CurrentClassName); data/pccts-1.33MR33/antlr/main.c:829:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Parser_c_Name, CurrentClassName); data/pccts-1.33MR33/antlr/main.c:830:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(Parser_c_Name, CPP_FILE_SUFFIX); data/pccts-1.33MR33/antlr/main.c:1061:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[CurFile], zzline); data/pccts-1.33MR33/antlr/main.c:1157:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, fs); data/pccts-1.33MR33/antlr/main.c:1162:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buf,suffix); data/pccts-1.33MR33/antlr/main.c:1176:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, f, l); data/pccts-1.33MR33/antlr/main.c:1192:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, f, l); data/pccts-1.33MR33/antlr/main.c:1194:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, f, l); data/pccts-1.33MR33/antlr/main.c:1196:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, f, l); data/pccts-1.33MR33/antlr/main.c:1198:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, f, l); data/pccts-1.33MR33/antlr/main.c:1228:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, s, a1, a2, a3); data/pccts-1.33MR33/antlr/main.c:1244:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, s, d); data/pccts-1.33MR33/antlr/main.c:1260:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, s, d1, d2); data/pccts-1.33MR33/antlr/main.c:1526:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(newname, OutputDirectory); data/pccts-1.33MR33/antlr/main.c:1530:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(newname, dir_sym); data/pccts-1.33MR33/antlr/main.c:1532:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(newname, p); data/pccts-1.33MR33/antlr/main.c:1610:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, f, l); data/pccts-1.33MR33/antlr/main.c:1624:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[CurFile], zzline); data/pccts-1.33MR33/antlr/main.c:1638:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[CurFile], zzline); data/pccts-1.33MR33/antlr/main.c:1663:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, f, l); data/pccts-1.33MR33/antlr/main.c:1677:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[CurFile], zzline); data/pccts-1.33MR33/antlr/main.c:1691:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[CurFile], zzline); data/pccts-1.33MR33/antlr/main.c:1707:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ua->action, s); data/pccts-1.33MR33/antlr/main.c:1723:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%s", name); data/pccts-1.33MR33/antlr/main.c:1745:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(p, buf); data/pccts-1.33MR33/antlr/misc.c:700:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(key,rule); data/pccts-1.33MR33/antlr/mrhoist.c:2218:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ruleNameStatic2,"%s/?",ruleNameStatic1); data/pccts-1.33MR33/antlr/mrhoist.c:2220:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ruleNameStatic2,"%s/%d",ruleNameStatic1,offset+1); data/pccts-1.33MR33/antlr/scan.c:1288:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if ( !GenCC ) sprintf(buf,"zzaArg(zztasp%d,%s)", data/pccts-1.33MR33/antlr/scan.c:1290:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(buf,"_t%d%s", data/pccts-1.33MR33/antlr/scan.c:1311:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if ( !GenCC ) sprintf(buf,"zzaArg(zztasp%d,%s).", data/pccts-1.33MR33/antlr/scan.c:1313:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(buf,"_t%d%s.", data/pccts-1.33MR33/antlr/scan.c:1347:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if ( !GenCC ) sprintf(buf,"zzaArg(zztasp%s,%s)",i,j); data/pccts-1.33MR33/antlr/scan.c:1348:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(buf,"_t%s%s",i,j); data/pccts-1.33MR33/antlr/scan.c:1372:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf,"_retv.%s",&zzbegexpr[1]); data/pccts-1.33MR33/antlr/scan.c:1442:20: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if ( GenCC ) sprintf(buf,"_ast%d%s",BlkLevel-1,zzbegexpr+1); data/pccts-1.33MR33/antlr/scan.c:1443:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(buf,"zzastArg(%s)",zzbegexpr+1); data/pccts-1.33MR33/antlr/scan.c:1487:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%s_ast", zzbegexpr+1); data/pccts-1.33MR33/dlg/dlg_a.c:90:9: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(class_stream,format,string); /* MR1 */ data/pccts-1.33MR33/dlg/dlg_a.c:92:9: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(OUT,format,string); /* MR1 */ data/pccts-1.33MR33/dlg/dlg_p.c:946:1: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, file_str[0]!=NULL?file_str[0]:"stdin", zzline); data/pccts-1.33MR33/dlg/output.c:125:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%s_h", name); data/pccts-1.33MR33/dlg/output.c:139:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(p, s); data/pccts-1.33MR33/dlg/output.c:244:11: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. /* MR1 */ fprintf(class_stream, data/pccts-1.33MR33/dlg/output.c:246:11: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. /* MR1 */ fprintf(class_stream, data/pccts-1.33MR33/dlg/output.c:715:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%s%s", class_name, suffix); data/pccts-1.33MR33/dlg/support.c:51:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,s,file,line); data/pccts-1.33MR33/dlg/support.c:170:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,ErrHdr, data/pccts-1.33MR33/dlg/support.c:184:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,ErrHdr, data/pccts-1.33MR33/dlg/support.c:198:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,ErrHdr, data/pccts-1.33MR33/dlg/support.c:230:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(newname, OutputDirectory); data/pccts-1.33MR33/dlg/support.c:234:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(newname, dir_sym); data/pccts-1.33MR33/dlg/support.c:237:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(newname, p); data/pccts-1.33MR33/h/AParser.cpp:557:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(zzFAILtext, LT(i)->getText()); data/pccts-1.33MR33/h/AParser.cpp:653:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(eMsgBuffer, err, d); // dangerous, but I don't care data/pccts-1.33MR33/h/AParser.cpp:660:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(eMsgBuffer, err, s); data/pccts-1.33MR33/h/AParser.cpp:667:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(eMsgBuffer, err, s, t); data/pccts-1.33MR33/h/AParser.cpp:860:11: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return vfprintf(pFile, pFormat, arglist); data/pccts-1.33MR33/h/ASTBase.cpp:252:15: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int iRet = vfprintf(pFile, pFormat, marker); data/pccts-1.33MR33/h/AToken.h:95:17: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int iRet = vfprintf(pFile, pFormat, marker); data/pccts-1.33MR33/h/AToken.h:136:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(object,"tok_%s",s); data/pccts-1.33MR33/h/AToken.h:205:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_text,s); data/pccts-1.33MR33/h/AToken.h:278:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_text,s); data/pccts-1.33MR33/h/ATokenBuffer.cpp:360:12: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. iRet = vfprintf(pFile, pFormat, marker); data/pccts-1.33MR33/h/DLexerBase.cpp:298:12: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. iRet = vfprintf(pFile, pFormat, marker); data/pccts-1.33MR33/h/PCCTSAST.cpp:605:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ebuf, "mismatch token in scan(): %s", scan_token_str(parser->token)); data/pccts-1.33MR33/h/PCCTSAST.cpp:681:15: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int iRet = vfprintf(pFile, pFormat, marker); data/pccts-1.33MR33/h/antlr.h:96:17: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, zzStackOvfMsg, __FILE__, __LINE__); \ data/pccts-1.33MR33/h/ast.h:38:17: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, zzStackOvfMsg, __FILE__, __LINE__); \ data/pccts-1.33MR33/h/charptr.c:57:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*a, text); data/pccts-1.33MR33/h/err.h:195:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(text, LATEXT(i)); data/pccts-1.33MR33/h/err.h:301:25: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). for (i=0; i<LL_K; i++) strcpy(buf->textLA[i], zztextLA[i]); data/pccts-1.33MR33/h/err.h:306:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf->text, zzlextext); data/pccts-1.33MR33/h/err.h:361:25: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). for (i=0; i<LL_K; i++) strcpy(zztextLA[i], buf->textLA[i]); data/pccts-1.33MR33/h/err.h:366:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(zzlextext, buf->text); data/pccts-1.33MR33/h/err.h:642:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(NLATEXT, zzinf_text[zzinf_labase]); data/pccts-1.33MR33/h/err.h:730:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&zzinf_text_buffer[zzinf_text_buffer_index], NLATEXT); data/pccts-1.33MR33/h/slist.cpp:113:15: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int iRet = vfprintf(pFile, pFormat, marker); data/pccts-1.33MR33/sorcerer/cpp.c:39:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(CPPParser_h_Name, CurClassName); data/pccts-1.33MR33/sorcerer/cpp.c:118:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(CPPParser_C_Name, CurClassName); data/pccts-1.33MR33/sorcerer/cpp.c:119:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(CPPParser_C_Name, CPP_FILE_SUFFIX); data/pccts-1.33MR33/sorcerer/gen.c:130:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(CPPParser_h_Name, CurClassName); data/pccts-1.33MR33/sorcerer/lib/STreeParser.cpp:158:15: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int iRet = vfprintf(pFile, pFormat, marker); data/pccts-1.33MR33/sorcerer/lib/astlib.c:751:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ebuf, "mismatch token in ast_scan(): %s", scan_token_str(parser->token)); data/pccts-1.33MR33/sorcerer/look.c:643:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[t->file], t->line); data/pccts-1.33MR33/sorcerer/look.c:662:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[t->file], t->line); data/pccts-1.33MR33/sorcerer/main.c:382:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if ( p->arg ) sprintf(buf, "%s ___", p->option); data/pccts-1.33MR33/sorcerer/main.c:383:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(buf, p->option); data/pccts-1.33MR33/sorcerer/main.c:493:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, s, a1, a2, a3); data/pccts-1.33MR33/sorcerer/main.c:508:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, s, d); data/pccts-1.33MR33/sorcerer/main.c:522:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, f, l); data/pccts-1.33MR33/sorcerer/main.c:683:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, fs); data/pccts-1.33MR33/sorcerer/main.c:688:16: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). if ( GenCPP ) strcat(buf, CPP_FILE_SUFFIX); data/pccts-1.33MR33/sorcerer/main.c:745:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(newname, OutputDirectory); data/pccts-1.33MR33/sorcerer/main.c:749:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(newname, dir_sym); data/pccts-1.33MR33/sorcerer/main.c:752:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(newname, p); data/pccts-1.33MR33/sorcerer/main.c:909:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(p, s); data/pccts-1.33MR33/sorcerer/main.c:936:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(p->type, t); data/pccts-1.33MR33/sorcerer/main.c:937:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(p->label, lab); data/pccts-1.33MR33/sorcerer/main.c:938:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(p->init, init); data/pccts-1.33MR33/sorcerer/main.c:977:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(p->init, s+1); data/pccts-1.33MR33/sorcerer/main.c:980:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(p->decl, decl); data/pccts-1.33MR33/sorcerer/main.c:981:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(p->var, id_in_decl(decl)); data/pccts-1.33MR33/sorcerer/main.c:1038:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(f, prefix); data/pccts-1.33MR33/sorcerer/main.c:1076:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(call, prefix); data/pccts-1.33MR33/sorcerer/main.c:1105:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(p, duh); data/pccts-1.33MR33/sorcerer/main.c:1111:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(call, s); data/pccts-1.33MR33/sorcerer/scan.c:912:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%s", zzbegexpr+1); data/pccts-1.33MR33/sorcerer/sor.c:370:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tokdefs_file, LATEXT(1)); data/pccts-1.33MR33/sorcerer/sor.c:371:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tokdefs_file, tokdefs_file+1); /* remove quotes */ data/pccts-1.33MR33/sorcerer/sor.c:965:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(zzastArg(1)->label, label.text); data/pccts-1.33MR33/sorcerer/sor.c:972:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(zzastArg(1)->label, label.text); data/pccts-1.33MR33/sorcerer/sor.c:1054:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(zzastArg(1)->label, label.text); data/pccts-1.33MR33/sorcerer/sor.c:1385:15: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(zzastArg(1)->label, label.text); t = zzastArg(1); data/pccts-1.33MR33/sorcerer/sor.c:1446:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(zzastArg(1)->label, label.text); data/pccts-1.33MR33/sorcerer/sor.c:1884:1: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ErrHdr, FileStr[CurFile]!=NULL?FileStr[CurFile]:"stdin", zzline); data/pccts-1.33MR33/sorcerer/sor.h:43:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. {fprintf(stderr, ErrHdr, f, l); \ data/pccts-1.33MR33/sorcerer/sor.h:46:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. {fprintf(stderr, ErrHdr, FileStr[CurFile], zzline); \ data/pccts-1.33MR33/sorcerer/sor.h:49:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. {fprintf(stderr, ErrHdr, FileStr[CurFile], zzline); \ data/pccts-1.33MR33/sorcerer/sor.h:53:20: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. {found_error=1; fprintf(stderr, ErrHdr, f, l); \ data/pccts-1.33MR33/sorcerer/sor.h:56:20: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. {found_error=1; fprintf(stderr, ErrHdr, FileStr[CurFile], zzline); \ data/pccts-1.33MR33/sorcerer/sor.h:59:20: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. {found_error=1; fprintf(stderr, ErrHdr, FileStr[CurFile], zzline); \ data/pccts-1.33MR33/sorcerer/test/test6.c:59:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(p->text, s); data/pccts-1.33MR33/sorcerer/test/test7/stdpccts.h:17:40: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). #define zzcr_ast(tr, attr, tok, txt) { strcpy(tr->text, txt); tr->token=tok; } data/pccts-1.33MR33/sorcerer/testcpp/test4/AST.h:14:46: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). AST(ANTLRTokenPtr t){ _type = t->getType(); strcpy(text, t->getText()); } data/pccts-1.33MR33/support/DECmms/genmms.c:226:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ATOKENBUFFER_O, ATOKENBUFFER_C); data/pccts-1.33MR33/support/DECmms/genmms.c:228:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(ATOKENBUFFER_O, OBJ_FILE_SUFFIX); data/pccts-1.33MR33/support/DECmms/genmms.c:229:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(APARSER_O, APARSER_C); data/pccts-1.33MR33/support/DECmms/genmms.c:231:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(APARSER_O, OBJ_FILE_SUFFIX); data/pccts-1.33MR33/support/DECmms/genmms.c:233:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ASTBASE_O, ASTBASE_C); data/pccts-1.33MR33/support/DECmms/genmms.c:235:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(ASTBASE_O, OBJ_FILE_SUFFIX); data/pccts-1.33MR33/support/DECmms/genmms.c:237:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(PCCTSAST_O, PCCTSAST_C); data/pccts-1.33MR33/support/DECmms/genmms.c:239:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(PCCTSAST_O, OBJ_FILE_SUFFIX); data/pccts-1.33MR33/support/DECmms/genmms.c:241:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(LIST_O, LIST_C); data/pccts-1.33MR33/support/DECmms/genmms.c:243:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(LIST_O, OBJ_FILE_SUFFIX); data/pccts-1.33MR33/support/DECmms/genmms.c:245:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(DLEXERBASE_O, DLEXERBASE_C); data/pccts-1.33MR33/support/DECmms/genmms.c:247:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(DLEXERBASE_O, OBJ_FILE_SUFFIX); data/pccts-1.33MR33/support/DECmms/genmms.c:271:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if ( p->arg ) sprintf(buf, "%s ___", p->option); data/pccts-1.33MR33/support/DECmms/genmms.c:272:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(buf, p->option); data/pccts-1.33MR33/support/DECmms/genmms.c:748:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%s", outdir); data/pccts-1.33MR33/support/genmk/genmk.c:388:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ATOKENBUFFER_O, ATOKENBUFFER_C); data/pccts-1.33MR33/support/genmk/genmk.c:390:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(ATOKENBUFFER_O, OBJ_FILE_SUFFIX); data/pccts-1.33MR33/support/genmk/genmk.c:391:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(APARSER_O, APARSER_C); data/pccts-1.33MR33/support/genmk/genmk.c:393:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(APARSER_O, OBJ_FILE_SUFFIX); data/pccts-1.33MR33/support/genmk/genmk.c:395:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ASTBASE_O, ASTBASE_C); data/pccts-1.33MR33/support/genmk/genmk.c:397:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(ASTBASE_O, OBJ_FILE_SUFFIX); data/pccts-1.33MR33/support/genmk/genmk.c:399:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(PCCTSAST_O, PCCTSAST_C); data/pccts-1.33MR33/support/genmk/genmk.c:401:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(PCCTSAST_O, OBJ_FILE_SUFFIX); data/pccts-1.33MR33/support/genmk/genmk.c:403:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(LIST_O, LIST_C); data/pccts-1.33MR33/support/genmk/genmk.c:405:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(LIST_O, OBJ_FILE_SUFFIX); data/pccts-1.33MR33/support/genmk/genmk.c:407:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(DLEXERBASE_O, DLEXERBASE_C); data/pccts-1.33MR33/support/genmk/genmk.c:409:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(DLEXERBASE_O, OBJ_FILE_SUFFIX); data/pccts-1.33MR33/support/genmk/genmk.c:441:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if ( p->arg ) sprintf(buf, "%s ___", p->option); data/pccts-1.33MR33/support/genmk/genmk.c:442:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(buf, p->option); data/pccts-1.33MR33/support/genmk/genmk.c:1064:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%s%s", outdir, DirectorySymbol); data/pccts-1.33MR33/support/genmk/genmk_old.c:208:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(strcat(cfiles," "), t); data/pccts-1.33MR33/support/genmk/genmk_old.c:265:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ATOKENBUFFER_O, ATOKENBUFFER_C); data/pccts-1.33MR33/support/genmk/genmk_old.c:267:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(ATOKENBUFFER_O, OBJ_FILE_SUFFIX); data/pccts-1.33MR33/support/genmk/genmk_old.c:268:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(APARSER_O, APARSER_C); data/pccts-1.33MR33/support/genmk/genmk_old.c:270:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(APARSER_O, OBJ_FILE_SUFFIX); data/pccts-1.33MR33/support/genmk/genmk_old.c:272:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ASTBASE_O, ASTBASE_C); data/pccts-1.33MR33/support/genmk/genmk_old.c:274:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(ASTBASE_O, OBJ_FILE_SUFFIX); data/pccts-1.33MR33/support/genmk/genmk_old.c:276:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(PCCTSAST_O, PCCTSAST_C); data/pccts-1.33MR33/support/genmk/genmk_old.c:278:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(PCCTSAST_O, OBJ_FILE_SUFFIX); data/pccts-1.33MR33/support/genmk/genmk_old.c:280:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(LIST_O, LIST_C); data/pccts-1.33MR33/support/genmk/genmk_old.c:282:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(LIST_O, OBJ_FILE_SUFFIX); data/pccts-1.33MR33/support/genmk/genmk_old.c:284:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(DLEXERBASE_O, DLEXERBASE_C); data/pccts-1.33MR33/support/genmk/genmk_old.c:286:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(DLEXERBASE_O, OBJ_FILE_SUFFIX); data/pccts-1.33MR33/support/genmk/genmk_old.c:310:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if ( p->arg ) sprintf(buf, "%s ___", p->option); data/pccts-1.33MR33/support/genmk/genmk_old.c:311:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(buf, p->option); data/pccts-1.33MR33/support/genmk/genmk_old.c:760:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%s%s", outdir, DirectorySymbol); data/pccts-1.33MR33/antlr/antlr.c:142:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(StripQuotes(fname), "r"); data/pccts-1.33MR33/antlr/antlr.c:406:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int go=1; char name[MaxRuleName+1]; data/pccts-1.33MR33/antlr/antlr.c:869:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(CurPredName,"#pred "); data/pccts-1.33MR33/antlr/antlr.c:1556:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tnum = atoi(LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:2894:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(eh->signalname, "default"); data/pccts-1.33MR33/antlr/antlr.c:3162:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). v = atoi(LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:3223:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). v=atoi(LATEXT(1)); data/pccts-1.33MR33/antlr/antlr.c:3287:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). v=atoi(LATEXT(1)); data/pccts-1.33MR33/antlr/fset.c:1041:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. for (i=1; i<=CLL_k; i++) free( (char *)ftbl[i] ); data/pccts-1.33MR33/antlr/fset.c:1072:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. for (i=1; i<=CLL_k; i++) free( (char *)ftbl[i] ); data/pccts-1.33MR33/antlr/fset.c:1120:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. for (i=1; i<=CLL_k; i++) free( (char *)ftbl[i] ); data/pccts-1.33MR33/antlr/fset.c:1140:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. for (i=1; i<=CLL_k; i++) free( (char *)ftbl[i] ); data/pccts-1.33MR33/antlr/fset.c:1158:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. for (i=1; i<=CLL_k; i++) free( (char *)ftbl[i] ); data/pccts-1.33MR33/antlr/fset.c:1231:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. for (i=1; i<=CLL_k; i++) free( (char *)ftbl[i] ); data/pccts-1.33MR33/antlr/fset.c:1251:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. for (i=1; i<=CLL_k; i++) free( (char *)ftbl[i] ); data/pccts-1.33MR33/antlr/fset.c:1303:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. for (i=1; i<=CLL_k; i++) free( (char *)ftbl[i] ); data/pccts-1.33MR33/antlr/fset.c:1349:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. for (i=1; i<=CLL_k; i++) free( (char *)ftbl[i] ); data/pccts-1.33MR33/antlr/fset.c:1378:34: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. for (i=1; i<=CLL_k; i++) free( (char *)ftbl[i] ); data/pccts-1.33MR33/antlr/fset2.c:1473:34: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. for (i=1; i<=CLL_k; i++) free( (char *)ft[i] ); data/pccts-1.33MR33/antlr/gen.c:1819:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char stringizeBuf[STRINGIZEBUFSIZE]; data/pccts-1.33MR33/antlr/gen.c:2292:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MaxRuleName+20]; /* MR23 */ data/pccts-1.33MR33/antlr/gen.c:2293:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char bufErrSet[MaxRuleName+20]; /* MR23 */ data/pccts-1.33MR33/antlr/gen.c:2315:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MaxRuleName+20]; /* MR23 */ data/pccts-1.33MR33/antlr/gen.c:2316:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char bufErrSet[MaxRuleName+20]; /* MR23 */ data/pccts-1.33MR33/antlr/gen.c:2334:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[sizeof("zzerr")+10]; data/pccts-1.33MR33/antlr/gen.c:2335:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char bufErrSet[sizeof("zzerr")+10]; data/pccts-1.33MR33/antlr/gen.c:2338:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if ( GenCC ) sprintf(buf, "err%d", n); data/pccts-1.33MR33/antlr/gen.c:2339:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(buf, "zzerr%d", n); data/pccts-1.33MR33/antlr/gen.c:2340:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if ( GenCC ) sprintf(bufErrSet, "err%d", nErrSet); data/pccts-1.33MR33/antlr/gen.c:2341:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(bufErrSet, "zzerr%d", nErrSet); data/pccts-1.33MR33/antlr/gen.c:3379:22: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). /* MR6 */ output = fopen(OutMetaName(outname(FileStr[q->file])), "w"); data/pccts-1.33MR33/antlr/gen.c:4357:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[100]; data/pccts-1.33MR33/antlr/gen.c:4368:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "err%d", n); data/pccts-1.33MR33/antlr/gen.c:4370:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "zzerr%d", n); data/pccts-1.33MR33/antlr/globals.c:313:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *FileStr[MaxNumFiles];/* Ptr to array of file names on command-line */ data/pccts-1.33MR33/antlr/globals.c:395:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Parser_h_Name[MaxFileName+1] = ""; data/pccts-1.33MR33/antlr/globals.c:396:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Parser_c_Name[MaxFileName+1] = ""; data/pccts-1.33MR33/antlr/globals.c:397:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char MRinfoFile_Name[MaxFileName+1] = ""; /* MR10 */ data/pccts-1.33MR33/antlr/globals.c:404:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char CurrentClassName[MaxRuleName]=""; data/pccts-1.33MR33/antlr/lex.c:53:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *dlgFile = fopen(OutMetaName(DlgFileName), "w"); data/pccts-1.33MR33/antlr/lex.c:232:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char dirSym[2] = DirectorySymbol; data/pccts-1.33MR33/antlr/lex.c:259:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). DefFile = fopen(OutMetaName(DefFileName), "w"); data/pccts-1.33MR33/antlr/lex.c:360:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(OutMetaName(RemapFileName), "w"); data/pccts-1.33MR33/antlr/main.c:135:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char Fn_in_Fl[MaxFLArea] = ""; data/pccts-1.33MR33/antlr/main.c:136:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char one_fn[MaxFileName]; data/pccts-1.33MR33/antlr/main.c:147:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fl = fopen(t, "r")) == NULL) data/pccts-1.33MR33/antlr/main.c:180:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). LL_k = atoi(t); data/pccts-1.33MR33/antlr/main.c:196:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). CLL_k = atoi(t); data/pccts-1.33MR33/antlr/main.c:212:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). TabWidth = atoi(t); /* MR6 */ data/pccts-1.33MR33/antlr/main.c:231:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). MR_AmbAidDepth = atoi(t); /* MR11 */ data/pccts-1.33MR33/antlr/main.c:243:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). TnodesReportThreshold = atoi(t); /* MR11 */ data/pccts-1.33MR33/antlr/main.c:487:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). TreeResourceLimit = atoi(t); data/pccts-1.33MR33/antlr/main.c:734:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (MR_AmbAidRule != NULL) MR_AmbAidLine=atoi(MR_AmbAidRule); data/pccts-1.33MR33/antlr/main.c:783:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *f = fopen(OutMetaName(stdpccts), "w"); data/pccts-1.33MR33/antlr/main.c:814:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ErrFile = fopen(OutMetaName(ErrFileName), "w"); data/pccts-1.33MR33/antlr/main.c:828:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(Parser_h_Name, ".h"); data/pccts-1.33MR33/antlr/main.c:832:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). Parser_h = fopen(OutMetaName(Parser_h_Name), "w"); data/pccts-1.33MR33/antlr/main.c:837:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). Parser_c = fopen(OutMetaName(Parser_c_Name), "w"); data/pccts-1.33MR33/antlr/main.c:1094:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(FileStr[CurFile], "r"); data/pccts-1.33MR33/antlr/main.c:1152:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MaxFileName+1]; data/pccts-1.33MR33/antlr/main.c:1226:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[250]; /* DANGEROUS as hell !!!!!! */ data/pccts-1.33MR33/antlr/main.c:1242:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[250]; /* DANGEROUS as hell !!!!!! */ data/pccts-1.33MR33/antlr/main.c:1258:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[250]; /* DANGEROUS as hell !!!!!! */ data/pccts-1.33MR33/antlr/main.c:1298:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char imag_name[20]; data/pccts-1.33MR33/antlr/main.c:1309:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(imag_name,"UnknownToken#%d",token); /* MR13 */ data/pccts-1.33MR33/antlr/main.c:1512:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char newname[MaxFileName+1]; data/pccts-1.33MR33/antlr/main.c:1544:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char newname[MaxFileName+1]; data/pccts-1.33MR33/antlr/main.c:1721:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[100]; data/pccts-1.33MR33/antlr/main.c:1741:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[100]; data/pccts-1.33MR33/antlr/main.c:1743:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "_blk%d_alt%d", blockid, altnum); data/pccts-1.33MR33/antlr/misc.c:99:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. lclass[i].exprs = (char **) data/pccts-1.33MR33/antlr/misc.c:100:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. realloc((char *)lclass[i].exprs, tsize*sizeof(char *)); data/pccts-1.33MR33/antlr/misc.c:693:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char key[MaxRuleName+2+2+1]; /* MR10 */ data/pccts-1.33MR33/antlr/misc.c:943:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. free( (char *)Cycles[k] ); data/pccts-1.33MR33/antlr/misc.c:1679:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char strBetweenWorkArea[MAX_STR_BETWEEN_WORK_AREA]; data/pccts-1.33MR33/antlr/mrhoist.c:2204:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ruleNameStatic1[ruleNameMax]; data/pccts-1.33MR33/antlr/mrhoist.c:2205:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ruleNameStatic2[ruleNameMax+10]; data/pccts-1.33MR33/antlr/pred.c:86:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). k = atoi(p+strlen("LT(")); data/pccts-1.33MR33/antlr/pred.c:103:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). k = atoi(p); data/pccts-1.33MR33/antlr/scan.c:238:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). zzline = atoi(zzbegexpr+5) - 1; zzline++; zzmore(); data/pccts-1.33MR33/antlr/scan.c:552:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift0[257] = { data/pccts-1.33MR33/antlr/scan.c:625:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift1[257] = { data/pccts-1.33MR33/antlr/scan.c:698:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift2[257] = { data/pccts-1.33MR33/antlr/scan.c:764:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift3[257] = { data/pccts-1.33MR33/antlr/scan.c:827:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift4[257] = { data/pccts-1.33MR33/antlr/scan.c:891:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift5[257] = { data/pccts-1.33MR33/antlr/scan.c:940:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift6[257] = { data/pccts-1.33MR33/antlr/scan.c:989:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift7[257] = { data/pccts-1.33MR33/antlr/scan.c:1038:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift8[257] = { data/pccts-1.33MR33/antlr/scan.c:1101:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift9[257] = { data/pccts-1.33MR33/antlr/scan.c:1283:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[100]; data/pccts-1.33MR33/antlr/scan.c:1287:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). set_orel(atoi(zzbegexpr+1), &attribsRefdFromAction); data/pccts-1.33MR33/antlr/scan.c:1305:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[100]; data/pccts-1.33MR33/antlr/scan.c:1310:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). set_orel(atoi(zzbegexpr+1), &attribsRefdFromAction); data/pccts-1.33MR33/antlr/scan.c:1328:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[100]; data/pccts-1.33MR33/antlr/scan.c:1329:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char i[20], j[20]; data/pccts-1.33MR33/antlr/scan.c:1361:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. { static char buf[300]; LabelEntry *el; data/pccts-1.33MR33/antlr/scan.c:1439:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[100]; data/pccts-1.33MR33/antlr/scan.c:1446:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). set_orel(atoi(zzbegexpr+1), &AST_nodes_refd_in_actions); data/pccts-1.33MR33/antlr/scan.c:1456:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). zzline = atoi(zzbegexpr+5) - 1; zzline++; zzmore(); data/pccts-1.33MR33/antlr/scan.c:1486:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[100]; data/pccts-1.33MR33/antlr/scan.c:1672:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift10[257] = { data/pccts-1.33MR33/antlr/scan.c:1839:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift11[257] = { data/pccts-1.33MR33/dlg/dlg_a.c:59:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char theClassName[100]; /* MR11 */ data/pccts-1.33MR33/dlg/dlg_a.c:320:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift0[257] = { data/pccts-1.33MR33/dlg/dlg_a.c:424:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift1[257] = { data/pccts-1.33MR33/dlg/dlg_a.c:481:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift2[257] = { data/pccts-1.33MR33/dlg/dlg_a.c:531:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift3[257] = { data/pccts-1.33MR33/dlg/main.c:35:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *file_str[2] = {NULL, NULL}; data/pccts-1.33MR33/dlg/output.c:80:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *mode_name[MAX_MODES]; data/pccts-1.33MR33/dlg/output.c:103:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *typevar[DIF_SIZE] = { t0, t1, t2, t3}; data/pccts-1.33MR33/dlg/output.c:110:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *typevar[DIF_SIZE] = { t0, t1, t2, t3}; data/pccts-1.33MR33/dlg/output.c:124:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[100]; data/pccts-1.33MR33/dlg/output.c:712:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[200]; data/pccts-1.33MR33/dlg/support.c:111:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(name, "r"); data/pccts-1.33MR33/dlg/support.c:140:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(OutMetaName(name), "w"); data/pccts-1.33MR33/dlg/support.c:216:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char newname[MaxFileName+1]; data/pccts-1.33MR33/h/AParser.cpp:253:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2000]; /* MR20 Was "static" */ data/pccts-1.33MR33/h/AParser.cpp:254:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "The minimum number of tokens you requested that the\nANTLRTokenBuffer buffer is not enough to satisfy your\nLT(%d) request; increase 'k' argument to constructor for ANTLRTokenBuffer\n", i); data/pccts-1.33MR33/h/AParser.h:151:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char eMsgBuffer[500]; data/pccts-1.33MR33/h/AToken.h:112:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char object[200]; data/pccts-1.33MR33/h/AToken.h:135:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if ( t==1 ) sprintf(object,"tok_EOF"); data/pccts-1.33MR33/h/AToken.h:147:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(object,"tok_blank"); data/pccts-1.33MR33/h/ATokenBuffer.cpp:44:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char test[1000]; data/pccts-1.33MR33/h/DLexer.h:58:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf((char *)ebuf,"Invalid automaton mode = %d ",m); data/pccts-1.33MR33/h/PBlackBox.h:104:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *f = fopen(fname, "r"); data/pccts-1.33MR33/h/PCCTSAST.cpp:570:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[100]; data/pccts-1.33MR33/h/PCCTSAST.cpp:581:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). label = atoi(parser->lexer->text); data/pccts-1.33MR33/h/PCCTSAST.cpp:593:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ScanAST *p = new_scanast(atoi(parser->lexer->text)); data/pccts-1.33MR33/h/PCCTSAST.cpp:638:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[100]; /* MR23 Remove static */ data/pccts-1.33MR33/h/PCCTSAST.cpp:662:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ebuf, "invalid char in scan: '%c'", scanner->c); data/pccts-1.33MR33/h/PCCTSAST.h:52:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[StringScanMaxText]; data/pccts-1.33MR33/h/antlr.h:225:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textLA[LL_K][ZZLEXBUFSIZE]; data/pccts-1.33MR33/h/antlr.h:230:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ZZLEXBUFSIZE]; data/pccts-1.33MR33/h/antlr.h:423:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. {static char zztoktext[ZZLEXBUFSIZE]; \ data/pccts-1.33MR33/h/antlr.h:426:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. {static char zztoktext[ZZLEXBUFSIZE]; \ data/pccts-1.33MR33/h/antlr.h:429:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. {static char zztoktext[ZZLEXBUFSIZE]; \ data/pccts-1.33MR33/h/charbuf.h:41:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef struct { char text[D_TextSize]; } Attrib; data/pccts-1.33MR33/h/dlgauto.h:72:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char zzebuf[70]; data/pccts-1.33MR33/h/dlgauto.h:267:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(zzebuf,"Invalid automaton mode = %d ",m); data/pccts-1.33MR33/h/err.h:164:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char text[LL_K*ZZLEXBUFSIZE+1]; data/pccts-1.33MR33/h/err.h:167:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char text[ZZLEXBUFSIZE+1]; data/pccts-1.33MR33/h/err.h:823:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (LA(1)==zzEOF_TOKEN)?"<eof>":(char *)LATEXT(1), data/pccts-1.33MR33/h/err.h:869:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (LA(1)==zzEOF_TOKEN)?"<eof>":(char *)LATEXT(1), data/pccts-1.33MR33/h/err.h:921:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char zzmbuf[70]; data/pccts-1.33MR33/h/err.h:932:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(zzmbuf, "Mode stack overflow "); data/pccts-1.33MR33/h/err.h:948:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. { sprintf(zzmbuf, "Mode stack underflow "); data/pccts-1.33MR33/h/err.h:967:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(modeStack, zzmstk, sizeof(zzmstk)); data/pccts-1.33MR33/h/int.h:35:35: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). #define zzcr_attr(a,tok,t) *(a) = atol(t); data/pccts-1.33MR33/sorcerer/cpp.c:37:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char CPPParser_h_Name[MaxFileName+1]; data/pccts-1.33MR33/sorcerer/cpp.c:40:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(CPPParser_h_Name, ".h"); data/pccts-1.33MR33/sorcerer/cpp.c:41:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). Parser_h = fopen(OutMetaName(CPPParser_h_Name), "w"); data/pccts-1.33MR33/sorcerer/cpp.c:116:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char CPPParser_C_Name[MaxFileName+1]; data/pccts-1.33MR33/sorcerer/cpp.c:121:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). Parser_c = fopen(OutMetaName(CPPParser_C_Name), "w"); data/pccts-1.33MR33/sorcerer/err.c:28:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int token; char text[MaxAtom+1], label[MaxRuleName+1]; \ data/pccts-1.33MR33/sorcerer/gen.c:118:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char CPPParser_h_Name[MaxFileName+1]; data/pccts-1.33MR33/sorcerer/gen.c:131:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(CPPParser_h_Name, ".h"); data/pccts-1.33MR33/sorcerer/gen.c:298:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). output = fopen(OutMetaName(outname(FileStr[t->file])), "w"); data/pccts-1.33MR33/sorcerer/gen.c:1204:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(def_token_file, "w"); data/pccts-1.33MR33/sorcerer/globals.c:34:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *FileStr[MaxNumFiles];/* Ptr to array of file names on command-line */ data/pccts-1.33MR33/sorcerer/globals.c:56:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char translator[MaxFileName+1]; data/pccts-1.33MR33/sorcerer/globals.c:57:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tokdefs_file[MaxFileName+1]; data/pccts-1.33MR33/sorcerer/globals.c:76:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char CurRefVarType[MaxAtom+1]; data/pccts-1.33MR33/sorcerer/globals.c:77:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char CurRefVarLabel[MaxAtom+1]; data/pccts-1.33MR33/sorcerer/globals.c:78:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char CurClassName[MaxAtom+1]=""; data/pccts-1.33MR33/sorcerer/lib/astlib.c:57:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[StringScanMaxText]; data/pccts-1.33MR33/sorcerer/lib/astlib.c:716:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ebuf[100]; data/pccts-1.33MR33/sorcerer/lib/astlib.c:727:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). label = atoi(parser->lexer->text); data/pccts-1.33MR33/sorcerer/lib/astlib.c:739:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ScanAST *p = new_scanast(atoi(parser->lexer->text)); data/pccts-1.33MR33/sorcerer/lib/astlib.c:806:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ebuf[100]; data/pccts-1.33MR33/sorcerer/lib/astlib.c:830:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ebuf, "invalid char in ast_scan: '%c'", scanner->c); data/pccts-1.33MR33/sorcerer/main.c:351:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ProtoFILE = fopen(OutMetaName(GenProtoFile), "w"); data/pccts-1.33MR33/sorcerer/main.c:376:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MaxRuleName+1]; data/pccts-1.33MR33/sorcerer/main.c:403:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(FileStr[CurFile], "r"); data/pccts-1.33MR33/sorcerer/main.c:491:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[250]; /* DANGEROUS as hell !!!!!! */ data/pccts-1.33MR33/sorcerer/main.c:506:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[250]; /* DANGEROUS as hell !!!!!! */ data/pccts-1.33MR33/sorcerer/main.c:679:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MaxFileName+1]; data/pccts-1.33MR33/sorcerer/main.c:689:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else strcat(buf, ".c"); data/pccts-1.33MR33/sorcerer/main.c:731:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char newname[MaxFileName+1]; data/pccts-1.33MR33/sorcerer/main.c:996:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char id[MaxAtom+1]; data/pccts-1.33MR33/sorcerer/main.c:1068:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tname[MaxRuleName+1]; data/pccts-1.33MR33/sorcerer/main.c:1069:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char duh[MaxRuleName+1]; data/pccts-1.33MR33/sorcerer/main.c:1070:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char call[MaxAtom+1]; data/pccts-1.33MR33/sorcerer/main.c:1104:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(duh, "%d", q->token_type); data/pccts-1.33MR33/sorcerer/scan.c:27:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int token; char text[MaxAtom+1], label[MaxRuleName+1]; \ data/pccts-1.33MR33/sorcerer/scan.c:87:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char func_call_str[MaxAtom+1]; data/pccts-1.33MR33/sorcerer/scan.c:325:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift0[257] = { data/pccts-1.33MR33/sorcerer/scan.c:391:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift1[257] = { data/pccts-1.33MR33/sorcerer/scan.c:457:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift2[257] = { data/pccts-1.33MR33/sorcerer/scan.c:523:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift3[257] = { data/pccts-1.33MR33/sorcerer/scan.c:586:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift4[257] = { data/pccts-1.33MR33/sorcerer/scan.c:635:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift5[257] = { data/pccts-1.33MR33/sorcerer/scan.c:684:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift6[257] = { data/pccts-1.33MR33/sorcerer/scan.c:747:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift7[257] = { data/pccts-1.33MR33/sorcerer/scan.c:797:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift8[257] = { data/pccts-1.33MR33/sorcerer/scan.c:909:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[100]; data/pccts-1.33MR33/sorcerer/scan.c:918:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf, "(*_result)"); data/pccts-1.33MR33/sorcerer/scan.c:1127:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift9[257] = { data/pccts-1.33MR33/sorcerer/scan.c:1190:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift10[257] = { data/pccts-1.33MR33/sorcerer/scan.c:1239:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift11[257] = { data/pccts-1.33MR33/sorcerer/scan.c:1398:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char shift12[257] = { data/pccts-1.33MR33/sorcerer/sor.c:28:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int token; char text[MaxAtom+1], label[MaxRuleName+1]; \ data/pccts-1.33MR33/sorcerer/sor.c:376:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(tokdefs_file, "r"); data/pccts-1.33MR33/sorcerer/sor.c:1640:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). p->token_type = atoi(zzaArg(zztasp2,3 ).text); data/pccts-1.33MR33/sorcerer/sor.c:1719:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). v=atoi(zzaArg(zztasp2,2 ).text); data/pccts-1.33MR33/sorcerer/sor.c:1818:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). v=atoi(zzaArg(zztasp4,2 ).text); data/pccts-1.33MR33/sorcerer/sor.h:95:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char decl[MaxAtom+1]; data/pccts-1.33MR33/sorcerer/sor.h:96:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var[MaxAtom+1]; data/pccts-1.33MR33/sorcerer/sor.h:97:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char init[MaxAtom+1]; data/pccts-1.33MR33/sorcerer/stdpccts.h:30:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int token; char text[MaxAtom+1], label[MaxRuleName+1]; \ data/pccts-1.33MR33/sorcerer/test/test6.c:17:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[50]; data/pccts-1.33MR33/sorcerer/test/test7/stdpccts.h:16:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. #define AST_FIELDS char text[AtomSize+1]; int token; data/pccts-1.33MR33/sorcerer/testcpp/test4/AST.h:11:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[AtomSize+1]; data/pccts-1.33MR33/support/DECmms/genmms.c:38:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ATOKENBUFFER_O[100]; data/pccts-1.33MR33/support/DECmms/genmms.c:39:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char APARSER_O[100]; data/pccts-1.33MR33/support/DECmms/genmms.c:40:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ASTBASE_O[100]; data/pccts-1.33MR33/support/DECmms/genmms.c:41:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char PCCTSAST_O[100]; data/pccts-1.33MR33/support/DECmms/genmms.c:42:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char LIST_O[100]; data/pccts-1.33MR33/support/DECmms/genmms.c:43:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char DLEXERBASE_O[100]; data/pccts-1.33MR33/support/DECmms/genmms.c:265:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[1000+1]; data/pccts-1.33MR33/support/DECmms/genmms.c:745:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[200+1]; data/pccts-1.33MR33/support/genmk/genmk.c:42:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ATOKENBUFFER_O[100]; data/pccts-1.33MR33/support/genmk/genmk.c:43:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char APARSER_O[100]; data/pccts-1.33MR33/support/genmk/genmk.c:44:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ASTBASE_O[100]; data/pccts-1.33MR33/support/genmk/genmk.c:45:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char PCCTSAST_O[100]; data/pccts-1.33MR33/support/genmk/genmk.c:46:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char LIST_O[100]; data/pccts-1.33MR33/support/genmk/genmk.c:47:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char DLEXERBASE_O[100]; data/pccts-1.33MR33/support/genmk/genmk.c:51:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *cfiles[MAX_CFILES]; data/pccts-1.33MR33/support/genmk/genmk.c:52:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *sfiles[MAX_SORS][MAX_SFILES],*sclasses[MAX_SORS]; data/pccts-1.33MR33/support/genmk/genmk.c:435:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[1000+1]; data/pccts-1.33MR33/support/genmk/genmk.c:1061:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[200+1]; data/pccts-1.33MR33/support/genmk/genmk_old.c:38:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ATOKENBUFFER_O[100]; data/pccts-1.33MR33/support/genmk/genmk_old.c:39:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char APARSER_O[100]; data/pccts-1.33MR33/support/genmk/genmk_old.c:40:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ASTBASE_O[100]; data/pccts-1.33MR33/support/genmk/genmk_old.c:41:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char PCCTSAST_O[100]; data/pccts-1.33MR33/support/genmk/genmk_old.c:42:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char LIST_O[100]; data/pccts-1.33MR33/support/genmk/genmk_old.c:43:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char DLEXERBASE_O[100]; data/pccts-1.33MR33/support/genmk/genmk_old.c:56:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cfiles[1600]=""; data/pccts-1.33MR33/support/genmk/genmk_old.c:304:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[1000+1]; data/pccts-1.33MR33/support/genmk/genmk_old.c:757:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[200+1]; data/pccts-1.33MR33/support/rexpr/rexpr.c:253:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[257]; /* alloc space for string of char in [] */ data/pccts-1.33MR33/support/rexpr/rexpr.c:335:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char set[256]; /* no duplicates */ data/pccts-1.33MR33/support/set/set.c:521:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char str_tmp[StrSize+1]; data/pccts-1.33MR33/antlr/antlr.c:86:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). HdrAction = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char)); data/pccts-1.33MR33/antlr/antlr.c:100:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FirstAction = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char)); data/pccts-1.33MR33/antlr/antlr.c:414:14: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). if(go) strncpy(name,LATEXT(1),MaxRuleName); data/pccts-1.33MR33/antlr/antlr.c:421:16: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). if(go) strncpy(name,LATEXT(1),MaxRuleName); data/pccts-1.33MR33/antlr/antlr.c:447:31: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. /* MR10 */ strncat(ClassDeclStuff," ",MaxClassDeclStuff); data/pccts-1.33MR33/antlr/antlr.c:448:31: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. /* MR10 */ strncat(ClassDeclStuff,LATEXT(1),MaxClassDeclStuff); data/pccts-1.33MR33/antlr/antlr.c:457:64: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). /* MR22 */ BaseClassName=(char *)calloc(strlen(LATEXT(1))+1,sizeof(char)); data/pccts-1.33MR33/antlr/antlr.c:568:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pdecl = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char)); data/pccts-1.33MR33/antlr/antlr.c:590:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ret = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char)); data/pccts-1.33MR33/antlr/antlr.c:689:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). a = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char)); data/pccts-1.33MR33/antlr/antlr.c:750:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). a = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char)); data/pccts-1.33MR33/antlr/antlr.c:784:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). /* MR1 */ a = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char)); data/pccts-1.33MR33/antlr/antlr.c:820:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). /* MR1 */ a = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char)); data/pccts-1.33MR33/antlr/antlr.c:868:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CurPredName=(char *)calloc(1,strlen(name) + 10); data/pccts-1.33MR33/antlr/antlr.c:1602:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). a = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char)); data/pccts-1.33MR33/antlr/antlr.c:2359:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). a = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char)); data/pccts-1.33MR33/antlr/antlr.c:2427:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). a = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char)); data/pccts-1.33MR33/antlr/antlr.c:2514:84: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). /* MR21 */ pFirstSetSymbol = (char *) calloc(strlen(LATEXT(1))+1, data/pccts-1.33MR33/antlr/antlr.c:2527:87: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). /* MR21 */ pFirstSetSymbol = (char *) calloc(strlen(LATEXT(1))+1, data/pccts-1.33MR33/antlr/antlr.c:2630:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). a = (char *)calloc(strlen(LATEXT(1))+1, sizeof(char)); data/pccts-1.33MR33/antlr/antlr.c:2846:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p[strlen(p)-1] = '\0'; /* kill trailing space */ data/pccts-1.33MR33/antlr/antlr.c:2887:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *a = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char)); data/pccts-1.33MR33/antlr/antlr.c:2892:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). eh->signalname = (char *) calloc(strlen("default")+1, sizeof(char)); data/pccts-1.33MR33/antlr/antlr.c:2994:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _retv->signalname = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char)); data/pccts-1.33MR33/antlr/antlr.c:3004:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _retv->signalname = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char)); data/pccts-1.33MR33/antlr/antlr.c:3024:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _retv->action = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char)); data/pccts-1.33MR33/antlr/antlr.c:3562:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen(egroup) > (size_t)0 ) fprintf(stderr, " in %s", egroup); data/pccts-1.33MR33/antlr/build.c:61:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *q = (char *) malloc( strlen(parm) + 1 ); data/pccts-1.33MR33/antlr/build.c:103:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). a->action = (char *) malloc( strlen(action)+1 ); data/pccts-1.33MR33/antlr/build.c:117:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). t=key=(char *)calloc(1,strlen(a->action)+1); data/pccts-1.33MR33/antlr/build.c:138:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). /* MR12c */ strEnd=strStart+strlen(strStart)-1; data/pccts-1.33MR33/antlr/gen.c:4527:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). prevFileNameMS=(char *)calloc(1,strlen(fileName)+1); data/pccts-1.33MR33/antlr/lex.c:203:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). q->expr[ strlen(q->expr) ] = '"'; data/pccts-1.33MR33/antlr/lex.c:874:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s[ strlen(s)-1 ] = '\0'; /* remove last quote */ data/pccts-1.33MR33/antlr/main.c:156:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fnl = strlen(one_fn); data/pccts-1.33MR33/antlr/main.c:1161:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). require(strlen(buf) + 2 < (size_t)MaxFileName, "outname: filename too big"); data/pccts-1.33MR33/antlr/main.c:1529:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (newname[strlen(newname)-1] != *dir_sym) { data/pccts-1.33MR33/antlr/main.c:1706:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ua->action = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char)); data/pccts-1.33MR33/antlr/main.c:1744:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p = (char *)malloc(strlen(buf)+1); data/pccts-1.33MR33/antlr/misc.c:698:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( (i=strlen(rule)) > MaxRuleName ) /* MR10 */ data/pccts-1.33MR33/antlr/mrhoist.c:2216:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(ruleNameStatic1,n->rname,ruleNameMax); data/pccts-1.33MR33/antlr/pred.c:86:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). k = atoi(p+strlen("LT(")); data/pccts-1.33MR33/antlr/pred.c:89:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p += strlen("LT("); data/pccts-1.33MR33/antlr/pred.c:102:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p += strlen("LATEXT("); data/pccts-1.33MR33/antlr/scan.c:1220:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen("consumeUntil("))); data/pccts-1.33MR33/antlr/scan.c:1285:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen(zzbegexpr)>(size_t)85 ) data/pccts-1.33MR33/antlr/scan.c:1307:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen(zzbegexpr)>(size_t)85 ) data/pccts-1.33MR33/antlr/scan.c:1309:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zzbegexpr[strlen(zzbegexpr)-1] = ' '; data/pccts-1.33MR33/antlr/scan.c:1332:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(zzbegexpr)>(size_t)85) fatal("$i.j attrib ref too big"); data/pccts-1.33MR33/antlr/scan.c:1370:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). require (strlen(zzbegexpr)<=(size_t)285, data/pccts-1.33MR33/antlr/scan.c:1440:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen(zzbegexpr)>(size_t)85 ) data/pccts-1.33MR33/dlg/dlg_p.c:957:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen(egroup) > (size_t)0 ) fprintf(stderr, " in %s", egroup); data/pccts-1.33MR33/dlg/output.c:138:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *p = (char *)malloc(strlen(s)+1); data/pccts-1.33MR33/dlg/support.c:233:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (newname[strlen(newname)-1] != *dir_sym) data/pccts-1.33MR33/h/AParser.cpp:457:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen(egroup) > 0 ) /* MR23 */ printMessage(stderr, " in %s", egroup); data/pccts-1.33MR33/h/AParser.cpp:556:20: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if ( i>1 ) strcat(zzFAILtext, " "); data/pccts-1.33MR33/h/AToken.h:195:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int getLength() const { return strlen(getText()); } // MR11 data/pccts-1.33MR33/h/AToken.h:203:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _text = new ANTLRChar[strlen(s)+1]; data/pccts-1.33MR33/h/AToken.h:209:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(_text,""); data/pccts-1.33MR33/h/AToken.h:268:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int getLength() const { return strlen(getText()); } // MR11 data/pccts-1.33MR33/h/AToken.h:276:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _text = new ANTLRChar[strlen(s)+1]; data/pccts-1.33MR33/h/AToken.h:282:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(_text,""); data/pccts-1.33MR33/h/BufFileInput.cpp:63:17: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int c = getc( input ); data/pccts-1.33MR33/h/BufFileInput.cpp:77:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen( s ); data/pccts-1.33MR33/h/BufFileInput.cpp:83:17: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int c = getc( input ); data/pccts-1.33MR33/h/DLexerBase.h:73:7: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c=getc(input); data/pccts-1.33MR33/h/charbuf.h:43:28: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). #define zzcr_attr(a,tok,t) strncpy((a)->text, t, D_TextSize-1); \ data/pccts-1.33MR33/h/charptr.c:55:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *a = (char *) malloc(strlen(text)+1); /* MR6 */ data/pccts-1.33MR33/h/dlgauto.h:81:33: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define ZZGETC_STREAM {zzchar = getc(zzstream_in); zzclass = ZZSHIFT(zzchar);} data/pccts-1.33MR33/h/err.h:194:14: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if ( i>1 ) strcat(text, " "); data/pccts-1.33MR33/h/err.h:442:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen(egroup) > 0 ) fprintf(stderr, " in %s", egroup); data/pccts-1.33MR33/h/err.h:638:23: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. {NLA = zzEOF_TOKEN; strcpy(NLATEXT, "");} data/pccts-1.33MR33/h/err.h:716:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while ( (zzinf_text_buffer_index+strlen(NLATEXT)+1) >= zzinf_text_buffer_size ) data/pccts-1.33MR33/h/err.h:731:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zzinf_text_buffer_index += strlen(NLATEXT)+1; data/pccts-1.33MR33/h/err.h:752:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zzinf_text_buffer_index += strlen(&zzinf_text_buffer[zzinf_text_buffer_index])+1; data/pccts-1.33MR33/sorcerer/err.c:39:22: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). {(node)->token=_tok; strncpy((node)->text, _text,MaxAtom);} data/pccts-1.33MR33/sorcerer/lib/sorcerer.c:59:69: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ( !root ) t->ast_right(_parser->write) = t->ast_right(_parser->read); data/pccts-1.33MR33/sorcerer/lib/sorcerer.c:60:54: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). t->ast_down(_parser->write) = t->ast_down(_parser->read); data/pccts-1.33MR33/sorcerer/lib/sorcerer.c:61:29: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ( t->ast_down(_parser->read)!=NULL ) data/pccts-1.33MR33/sorcerer/lib/sorcerer.c:62:49: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). _copy_wildcard(_parser, t->ast_down(_parser->read), 0); data/pccts-1.33MR33/sorcerer/lib/sorcerer.c:65:29: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). t = t->ast_right(_parser->read); data/pccts-1.33MR33/sorcerer/main.c:687:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). require(strlen(buf) + 2 < (size_t)MaxFileName, "outname: filename too big"); data/pccts-1.33MR33/sorcerer/main.c:748:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (newname[strlen(newname)-1] != *dir_sym) data/pccts-1.33MR33/sorcerer/main.c:879:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p = &s[strlen(s)-1]; /* start at end of string and work back */ data/pccts-1.33MR33/sorcerer/main.c:907:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *p = (char *) malloc(strlen(s)+1); data/pccts-1.33MR33/sorcerer/main.c:997:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *p = &(decl[strlen(decl)-1]); data/pccts-1.33MR33/sorcerer/main.c:1000:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). require(strlen(decl)>(size_t)0, "id_in_decl: empty decl"); data/pccts-1.33MR33/sorcerer/main.c:1009:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(id, start, end-start); data/pccts-1.33MR33/sorcerer/main.c:1028:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p = &s[strlen(s)-1]; /* start at end of string and work back */ data/pccts-1.33MR33/sorcerer/main.c:1077:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p = &call[strlen(prefix)]; data/pccts-1.33MR33/sorcerer/main.c:1093:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tname, b, e-b+1); data/pccts-1.33MR33/sorcerer/main.c:1106:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p += strlen(duh); data/pccts-1.33MR33/sorcerer/scan.c:38:22: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). {(node)->token=_tok; strncpy((node)->text, _text,MaxAtom);} data/pccts-1.33MR33/sorcerer/scan.c:789:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zzbegexpr[strlen(zzbegexpr)-1] = '\0'; data/pccts-1.33MR33/sorcerer/sor.c:39:22: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). {(node)->token=_tok; strncpy((node)->text, _text,MaxAtom);} data/pccts-1.33MR33/sorcerer/sor.c:372:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tokdefs_file[strlen(tokdefs_file)-1] = '\0'; data/pccts-1.33MR33/sorcerer/sor.c:414:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(CurClassName,LATEXT(1),MaxAtom); data/pccts-1.33MR33/sorcerer/sor.c:421:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(CurClassName,LATEXT(1),MaxAtom); data/pccts-1.33MR33/sorcerer/sor.c:1895:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen(egroup) > (size_t)0 ) fprintf(stderr, " in %s", egroup); data/pccts-1.33MR33/sorcerer/stdpccts.h:41:22: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). {(node)->token=_tok; strncpy((node)->text, _text,MaxAtom);} data/pccts-1.33MR33/support/DECmms/genmms.c:227:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ATOKENBUFFER_O[strlen(ATOKENBUFFER_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/DECmms/genmms.c:227:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ATOKENBUFFER_O[strlen(ATOKENBUFFER_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/DECmms/genmms.c:230:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). APARSER_O[strlen(APARSER_O)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/DECmms/genmms.c:230:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). APARSER_O[strlen(APARSER_O)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/DECmms/genmms.c:234:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ASTBASE_O[strlen(ASTBASE_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/DECmms/genmms.c:234:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ASTBASE_O[strlen(ASTBASE_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/DECmms/genmms.c:238:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). PCCTSAST_O[strlen(PCCTSAST_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/DECmms/genmms.c:238:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). PCCTSAST_O[strlen(PCCTSAST_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/DECmms/genmms.c:242:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). LIST_O[strlen(LIST_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/DECmms/genmms.c:242:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). LIST_O[strlen(LIST_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/DECmms/genmms.c:246:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DLEXERBASE_O[strlen(DLEXERBASE_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/DECmms/genmms.c:246:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DLEXERBASE_O[strlen(DLEXERBASE_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/DECmms/genmms.c:648:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *p = &(*files)[strlen(*files)-1]; data/pccts-1.33MR33/support/genmk/genmk.c:389:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ATOKENBUFFER_O[strlen(ATOKENBUFFER_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk.c:389:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ATOKENBUFFER_O[strlen(ATOKENBUFFER_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk.c:392:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). APARSER_O[strlen(APARSER_O)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk.c:392:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). APARSER_O[strlen(APARSER_O)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk.c:396:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ASTBASE_O[strlen(ASTBASE_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk.c:396:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ASTBASE_O[strlen(ASTBASE_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk.c:400:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). PCCTSAST_O[strlen(PCCTSAST_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk.c:400:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). PCCTSAST_O[strlen(PCCTSAST_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk.c:404:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). LIST_O[strlen(LIST_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk.c:404:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). LIST_O[strlen(LIST_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk.c:408:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DLEXERBASE_O[strlen(DLEXERBASE_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk.c:408:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DLEXERBASE_O[strlen(DLEXERBASE_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk.c:944:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *p = &(*files)[strlen(*files)-1]; data/pccts-1.33MR33/support/genmk/genmk_old.c:208:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(strcat(cfiles," "), t); data/pccts-1.33MR33/support/genmk/genmk_old.c:266:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ATOKENBUFFER_O[strlen(ATOKENBUFFER_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk_old.c:266:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ATOKENBUFFER_O[strlen(ATOKENBUFFER_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk_old.c:269:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). APARSER_O[strlen(APARSER_O)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk_old.c:269:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). APARSER_O[strlen(APARSER_O)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk_old.c:273:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ASTBASE_O[strlen(ASTBASE_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk_old.c:273:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ASTBASE_O[strlen(ASTBASE_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk_old.c:277:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). PCCTSAST_O[strlen(PCCTSAST_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk_old.c:277:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). PCCTSAST_O[strlen(PCCTSAST_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk_old.c:281:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). LIST_O[strlen(LIST_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk_old.c:281:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). LIST_O[strlen(LIST_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk_old.c:285:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DLEXERBASE_O[strlen(DLEXERBASE_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk_old.c:285:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DLEXERBASE_O[strlen(DLEXERBASE_C)-strlen(CPP_FILE_SUFFIX)] = '\0'; data/pccts-1.33MR33/support/genmk/genmk_old.c:658:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *p = &(*files)[strlen(*files)-1]; data/pccts-1.33MR33/support/set/set.c:557:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). set_new(a, strlen(s)); data/pccts-1.33MR33/testcpp/2/MyLexer.cpp:23:6: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getchar(); data/pccts-1.33MR33/testcpp/2/MyLexer.cpp:39:34: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ( c==' ' || c=='\n' ) c=getchar(); data/pccts-1.33MR33/testcpp/2/MyLexer.cpp:47:8: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getchar(); data/pccts-1.33MR33/testcpp/2/MyLexer.cpp:61:8: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getchar(); data/pccts-1.33MR33/testcpp/3/MyLexer.cpp:23:6: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getchar(); data/pccts-1.33MR33/testcpp/3/MyLexer.cpp:39:34: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ( c==' ' || c=='\n' ) c=getchar(); data/pccts-1.33MR33/testcpp/3/MyLexer.cpp:47:8: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getchar(); data/pccts-1.33MR33/testcpp/3/MyLexer.cpp:61:8: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getchar(); ANALYSIS SUMMARY: Hits = 642 Lines analyzed = 62677 in approximately 1.83 seconds (34343 lines/second) Physical Source Lines of Code (SLOC) = 49301 Hits@level = [0] 2056 [1] 149 [2] 243 [3] 0 [4] 250 [5] 0 Hits@level+ = [0+] 2698 [1+] 642 [2+] 493 [3+] 250 [4+] 250 [5+] 0 Hits/KSLOC@level+ = [0+] 54.7251 [1+] 13.022 [2+] 9.9998 [3+] 5.07089 [4+] 5.07089 [5+] 0 Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.