Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/perl-5.32.0/EXTERN.h Examining data/perl-5.32.0/overload.h Examining data/perl-5.32.0/sv.c Examining data/perl-5.32.0/pp_proto.h Examining data/perl-5.32.0/miniperlmain.c Examining data/perl-5.32.0/pad.h Examining data/perl-5.32.0/dosish.h Examining data/perl-5.32.0/plan9/plan9ish.h Examining data/perl-5.32.0/plan9/arpa/inet.h Examining data/perl-5.32.0/plan9/plan9.c Examining data/perl-5.32.0/perlio.h Examining data/perl-5.32.0/zaphod32_hash.h Examining data/perl-5.32.0/qnx/qnx.c Examining data/perl-5.32.0/uconfig.h Examining data/perl-5.32.0/malloc_ctl.h Examining data/perl-5.32.0/scope.c Examining data/perl-5.32.0/fakesdio.h Examining data/perl-5.32.0/hv.c Examining data/perl-5.32.0/opnames.h Examining data/perl-5.32.0/globals.c Examining data/perl-5.32.0/regexp.h Examining data/perl-5.32.0/malloc.c Examining data/perl-5.32.0/hv_func.h Examining data/perl-5.32.0/doio.c Examining data/perl-5.32.0/doop.c Examining data/perl-5.32.0/pp_sort.c Examining data/perl-5.32.0/opcode.h Examining data/perl-5.32.0/ebcdic_tables.h Examining data/perl-5.32.0/pp.c Examining data/perl-5.32.0/hv.h Examining data/perl-5.32.0/util.c Examining data/perl-5.32.0/perlio.c Examining data/perl-5.32.0/sv.h Examining data/perl-5.32.0/handy.h Examining data/perl-5.32.0/scope.h Examining data/perl-5.32.0/perly.c Examining data/perl-5.32.0/reentr.c Examining data/perl-5.32.0/ext/Amiga-ARexx/tagtypes.h Examining data/perl-5.32.0/ext/Win32CORE/Win32CORE.c Examining data/perl-5.32.0/ext/Amiga-Exec/tagtypes.h Examining data/perl-5.32.0/ext/DynaLoader/dlutils.c Examining data/perl-5.32.0/ext/XS-APItest/notcore.c Examining data/perl-5.32.0/ext/XS-APItest/exception.c Examining data/perl-5.32.0/ext/XS-APItest/core.c Examining data/perl-5.32.0/ext/File-Glob/bsd_glob.c Examining data/perl-5.32.0/ext/File-Glob/bsd_glob.h Examining data/perl-5.32.0/ext/re/re_comp.h Examining data/perl-5.32.0/ext/re/re_top.h Examining data/perl-5.32.0/ext/XS-Typemap/stdio.c Examining data/perl-5.32.0/ext/SDBM_File/util.c Examining data/perl-5.32.0/ext/SDBM_File/sdbm.c Examining data/perl-5.32.0/ext/SDBM_File/sdbm.h Examining data/perl-5.32.0/ext/SDBM_File/tune.h Examining data/perl-5.32.0/ext/SDBM_File/pair.h Examining data/perl-5.32.0/ext/SDBM_File/hash.c Examining data/perl-5.32.0/ext/SDBM_File/dba.c Examining data/perl-5.32.0/ext/SDBM_File/dbd.c Examining data/perl-5.32.0/ext/SDBM_File/dbe.c Examining data/perl-5.32.0/ext/SDBM_File/pair.c Examining data/perl-5.32.0/ext/SDBM_File/dbu.c Examining data/perl-5.32.0/caretx.c Examining data/perl-5.32.0/hv_macro.h Examining data/perl-5.32.0/reentr.h Examining data/perl-5.32.0/form.h Examining data/perl-5.32.0/unixish.h Examining data/perl-5.32.0/av.h Examining data/perl-5.32.0/gv.h Examining data/perl-5.32.0/charclass_invlists.h Examining data/perl-5.32.0/win32/runperl.c Examining data/perl-5.32.0/win32/win32.h Examining data/perl-5.32.0/win32/vdir.h Examining data/perl-5.32.0/win32/fcrypt.c Examining data/perl-5.32.0/win32/perlhost.h Examining data/perl-5.32.0/win32/win32sck.c Examining data/perl-5.32.0/win32/vmem.h Examining data/perl-5.32.0/win32/include/sys/socket.h Examining data/perl-5.32.0/win32/include/sys/errno2.h Examining data/perl-5.32.0/win32/include/netdb.h Examining data/perl-5.32.0/win32/include/dirent.h Examining data/perl-5.32.0/win32/include/arpa/inet.h Examining data/perl-5.32.0/win32/win32io.c Examining data/perl-5.32.0/win32/win32thread.c Examining data/perl-5.32.0/win32/perlglob.c Examining data/perl-5.32.0/win32/win32.c Examining data/perl-5.32.0/win32/win32thread.h Examining data/perl-5.32.0/win32/perllib.c Examining data/perl-5.32.0/win32/win32iop.h Examining data/perl-5.32.0/djgpp/djgpp.h Examining data/perl-5.32.0/djgpp/djgpp.c Examining data/perl-5.32.0/cv.h Examining data/perl-5.32.0/pp_sys.c Examining data/perl-5.32.0/cygwin/cygwin.c Examining data/perl-5.32.0/pad.c Examining data/perl-5.32.0/embedvar.h Examining data/perl-5.32.0/perl.h Examining data/perl-5.32.0/run.c Examining data/perl-5.32.0/inline.h Examining data/perl-5.32.0/pp_ctl.c Examining data/perl-5.32.0/sbox32_hash.h Examining data/perl-5.32.0/op_reg_common.h Examining data/perl-5.32.0/op.h Examining data/perl-5.32.0/op.c Examining data/perl-5.32.0/mathoms.c Examining data/perl-5.32.0/time64.h Examining data/perl-5.32.0/perl_langinfo.h Examining data/perl-5.32.0/utfebcdic.h Examining data/perl-5.32.0/cop.h Examining data/perl-5.32.0/regnodes.h Examining data/perl-5.32.0/hints/t001.c Examining data/perl-5.32.0/time64.c Examining data/perl-5.32.0/regcomp.h Examining data/perl-5.32.0/pp.h Examining data/perl-5.32.0/vos/vosish.h Examining data/perl-5.32.0/vos/vos.c Examining data/perl-5.32.0/mg_vtable.h Examining data/perl-5.32.0/mg.h Examining data/perl-5.32.0/dist/IO/poll.h Examining data/perl-5.32.0/dist/IO/poll.c Examining data/perl-5.32.0/dist/Devel-PPPort/module2.c Examining data/perl-5.32.0/dist/Devel-PPPort/module3.c Examining data/perl-5.32.0/taint.c Examining data/perl-5.32.0/thread.h Examining data/perl-5.32.0/vutil.c Examining data/perl-5.32.0/stadtx_hash.h Examining data/perl-5.32.0/os2/perlrexx.c Examining data/perl-5.32.0/os2/os2ish.h Examining data/perl-5.32.0/os2/OS2/OS2-ExtAttr/myea.h Examining data/perl-5.32.0/os2/os2thread.h Examining data/perl-5.32.0/os2/dlfcn.h Examining data/perl-5.32.0/os2/dl_os2.c Examining data/perl-5.32.0/os2/os2.c Examining data/perl-5.32.0/regcomp.c Examining data/perl-5.32.0/generate_uudmap.c Examining data/perl-5.32.0/dquote.c Examining data/perl-5.32.0/time64_config.h Examining data/perl-5.32.0/util.h Examining data/perl-5.32.0/numeric.c Examining data/perl-5.32.0/mg.c Examining data/perl-5.32.0/utf8.c Examining data/perl-5.32.0/gv.c Examining data/perl-5.32.0/warnings.h Examining data/perl-5.32.0/iperlsys.h Examining data/perl-5.32.0/perl_inc_macro.h Examining data/perl-5.32.0/amigaos4/amigaos.c Examining data/perl-5.32.0/amigaos4/amigaos.h Examining data/perl-5.32.0/amigaos4/amigaio.h Examining data/perl-5.32.0/amigaos4/amigaio.c Examining data/perl-5.32.0/uni_keywords.h Examining data/perl-5.32.0/perly.h Examining data/perl-5.32.0/mro_core.c Examining data/perl-5.32.0/l1_char_class_tab.h Examining data/perl-5.32.0/regcharclass.h Examining data/perl-5.32.0/XSUB.h Examining data/perl-5.32.0/nostdio.h Examining data/perl-5.32.0/toke.c Examining data/perl-5.32.0/symbian/PerlUi.cpp Examining data/perl-5.32.0/symbian/PerlUi.h Examining data/perl-5.32.0/symbian/symbian_utils.cpp Examining data/perl-5.32.0/symbian/PerlApp.h Examining data/perl-5.32.0/symbian/symbian_proto.h Examining data/perl-5.32.0/symbian/PerlApp.cpp Examining data/perl-5.32.0/symbian/symbian_stubs.c Examining data/perl-5.32.0/symbian/PerlBase.h Examining data/perl-5.32.0/symbian/PerlBase.cpp Examining data/perl-5.32.0/symbian/PerlUtil.cpp Examining data/perl-5.32.0/symbian/PerlUtil.h Examining data/perl-5.32.0/symbian/symbianish.h Examining data/perl-5.32.0/symbian/symbian_dll.cpp Examining data/perl-5.32.0/symbian/symbian_stubs.h Examining data/perl-5.32.0/symbian/PerlRecog.cpp Examining data/perl-5.32.0/perlapi.h Examining data/perl-5.32.0/parser.h Examining data/perl-5.32.0/perlapi.c Examining data/perl-5.32.0/proto.h Examining data/perl-5.32.0/perlvars.h Examining data/perl-5.32.0/utf8.h Examining data/perl-5.32.0/keywords.c Examining data/perl-5.32.0/vms/vmsish.h Examining data/perl-5.32.0/vms/vms.c Examining data/perl-5.32.0/vms/munchconfig.c Examining data/perl-5.32.0/mg_raw.h Examining data/perl-5.32.0/perliol.h Examining data/perl-5.32.0/mydtrace.h Examining data/perl-5.32.0/cpan/Encode/Encode/encode.h Examining data/perl-5.32.0/cpan/Encode/encengine.c Examining data/perl-5.32.0/cpan/Sys-Syslog/fallback/syslog.h Examining data/perl-5.32.0/cpan/Win32API-File/cFile.h Examining data/perl-5.32.0/cpan/Win32API-File/const2perl.h Examining data/perl-5.32.0/cpan/Win32API-File/buffers.h Examining data/perl-5.32.0/cpan/Compress-Raw-Bzip2/fallback/constants.h Examining data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/bzlib.h Examining data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/blocksort.c Examining data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/huffman.c Examining data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/bzlib_private.h Examining data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/bzlib.c Examining data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/crctable.c Examining data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/compress.c Examining data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/randtable.c Examining data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/decompress.c Examining data/perl-5.32.0/cpan/DB_File/version.c Examining data/perl-5.32.0/cpan/Digest-SHA/src/sha64bit.c Examining data/perl-5.32.0/cpan/Digest-SHA/src/sha.h Examining data/perl-5.32.0/cpan/Digest-SHA/src/sha.c Examining data/perl-5.32.0/cpan/Digest-SHA/src/sdf.c Examining data/perl-5.32.0/cpan/Digest-SHA/src/sha64bit.h Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/inffast.h Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/deflate.c Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/inftrees.c Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/inffixed.h Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/adler32.c Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/inflate.c Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/crc32.c Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/inffast.c Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/trees.h Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/inflate.h Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/uncompr.c Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/inftrees.h Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/infback.c Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/trees.c Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/zlib.h Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/zconf.h Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/compress.c Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/zutil.c Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/zutil.h Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/deflate.h Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/crc32.h Examining data/perl-5.32.0/cpan/Compress-Raw-Zlib/fallback/constants.h Examining data/perl-5.32.0/cpan/Scalar-List-Utils/multicall.h Examining data/perl-5.32.0/av.c Examining data/perl-5.32.0/INTERN.h Examining data/perl-5.32.0/NetWare/netware.h Examining data/perl-5.32.0/NetWare/nw5iop.h Examining data/perl-5.32.0/NetWare/nwperlsys.h Examining data/perl-5.32.0/NetWare/nwtinfo.h Examining data/perl-5.32.0/NetWare/nwplglob.h Examining data/perl-5.32.0/NetWare/nwplglob.c Examining data/perl-5.32.0/NetWare/nwpipe.h Examining data/perl-5.32.0/NetWare/Nwpipe.c Examining data/perl-5.32.0/NetWare/nwhashcls.h Examining data/perl-5.32.0/NetWare/perllib.cpp Examining data/perl-5.32.0/NetWare/nwperlhost.h Examining data/perl-5.32.0/NetWare/CLIBstuf.h Examining data/perl-5.32.0/NetWare/nw5thread.c Examining data/perl-5.32.0/NetWare/CLIBstuf.c Examining data/perl-5.32.0/NetWare/nw5sck.c Examining data/perl-5.32.0/NetWare/nw5.c Examining data/perl-5.32.0/NetWare/sv_nw.c Examining data/perl-5.32.0/NetWare/intdef.h Examining data/perl-5.32.0/NetWare/nwperlsys.c Examining data/perl-5.32.0/NetWare/Nwmain.c Examining data/perl-5.32.0/NetWare/nwutil.h Examining data/perl-5.32.0/NetWare/NWTInfo.c Examining data/perl-5.32.0/NetWare/interface.c Examining data/perl-5.32.0/NetWare/testnlm/echo/echo.c Examining data/perl-5.32.0/NetWare/testnlm/type/type.c Examining data/perl-5.32.0/NetWare/nw5thread.h Examining data/perl-5.32.0/NetWare/nwhashcls.cpp Examining data/perl-5.32.0/NetWare/win32ish.h Examining data/perl-5.32.0/NetWare/interface.cpp Examining data/perl-5.32.0/NetWare/CLIBsdio.h Examining data/perl-5.32.0/NetWare/nw5sck.h Examining data/perl-5.32.0/NetWare/Main.c Examining data/perl-5.32.0/NetWare/deb.h Examining data/perl-5.32.0/NetWare/iperlhost.h Examining data/perl-5.32.0/NetWare/CLIBstr.h Examining data/perl-5.32.0/NetWare/interface.h Examining data/perl-5.32.0/NetWare/nwstdio.h Examining data/perl-5.32.0/NetWare/nwvmem.h Examining data/perl-5.32.0/NetWare/NWUtil.c Examining data/perl-5.32.0/feature.h Examining data/perl-5.32.0/deb.c Examining data/perl-5.32.0/embed.h Examining data/perl-5.32.0/pp_pack.c Examining data/perl-5.32.0/invlist_inline.h Examining data/perl-5.32.0/metaconfig.h Examining data/perl-5.32.0/perlsdio.h Examining data/perl-5.32.0/universal.c Examining data/perl-5.32.0/Porting/timecheck2.c Examining data/perl-5.32.0/Porting/timecheck.c Examining data/perl-5.32.0/regexec.c Examining data/perl-5.32.0/intrpvar.h Examining data/perl-5.32.0/unicode_constants.h Examining data/perl-5.32.0/keywords.h Examining data/perl-5.32.0/vutil.h Examining data/perl-5.32.0/haiku/haikuish.h Examining data/perl-5.32.0/t/lib/h2ph.h Examining data/perl-5.32.0/regen-configure/dist/lib/C/fake/dup2.C Examining data/perl-5.32.0/regen-configure/dist/lib/C/fake/getopt.C Examining data/perl-5.32.0/regen-configure/dist/lib/C/fake/rename.C Examining data/perl-5.32.0/regen-configure/dist/lib/C/fake/scandir.C Examining data/perl-5.32.0/regen-configure/dist/lib/C/fake/setsid.C Examining data/perl-5.32.0/locale.c Examining data/perl-5.32.0/patchlevel.h Examining data/perl-5.32.0/perl.c Examining data/perl-5.32.0/dump.c Examining data/perl-5.32.0/pp_hot.c FINAL RESULTS: data/perl-5.32.0/NetWare/nw5.c:81:12: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. return chmod(path, mode); data/perl-5.32.0/XSUB.h:592:13: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. # define chmod PerlLIO_chmod data/perl-5.32.0/caretx.c:112:19: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. SSize_t len = readlink(PROCSELFEXE_PATH, buf, sizeof(buf) - 1); data/perl-5.32.0/iperlsys.h:750:35: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. #define PerlLIO_chmod(file, mode) chmod((file), (mode)) data/perl-5.32.0/iperlsys.h:751:41: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. #define PerlLIO_chown(file, owner, grp) chown((file), (owner), (grp)) data/perl-5.32.0/os2/os2.c:1782:8: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. #undef chmod data/perl-5.32.0/os2/os2.c:1789:9: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. return chmod(name, pmode); data/perl-5.32.0/os2/os2ish.h:451:9: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. #define chmod(path,mode) os2_chmod((path),(mode)) data/perl-5.32.0/pp_sys.c:3828:11: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. len = readlink(tmps, buf, sizeof(buf) - 1); data/perl-5.32.0/vms/vms.c:2147:9: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. ret = chmod(changefile, mode); data/perl-5.32.0/vms/vmsish.h:499:9: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. #define chmod(file_spec, mode) my_chmod((file_spec), (mode)) data/perl-5.32.0/win32/perlhost.h:925:12: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. return chown(filename, owner, group); data/perl-5.32.0/win32/win32.c:1137:1: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. chown(const char *path, uid_t owner, gid_t group) data/perl-5.32.0/win32/win32.c:3440:12: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. return chmod(PerlDir_mapA(path), mode); data/perl-5.32.0/win32/win32.c:4010:12: [5] (buffer) gets: Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead. return gets(s); data/perl-5.32.0/win32/win32.h:309:16: [5] (buffer) gets: Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead. EXTERN_C char *gets(char* buffer); data/perl-5.32.0/win32/win32.h:425:12: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. extern int chown(const char *p, uid_t o, gid_t g); data/perl-5.32.0/win32/win32iop.h:276:9: [5] (buffer) gets: Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead. #define gets win32_gets data/perl-5.32.0/win32/win32iop.h:286:9: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. #define chmod(p,m) win32_chmod(p,m) data/perl-5.32.0/NetWare/NWUtil.c:142:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buffer, commandLine); data/perl-5.32.0/NetWare/NWUtil.c:202:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buffer, commandLine); data/perl-5.32.0/NetWare/NWUtil.c:358:4: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(pclp->m_argv[index], (char *)"-{%x", &pclp->m_qSemaphore); data/perl-5.32.0/NetWare/NWUtil.c:449:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(new_argv[i], pclp->m_argv[i]); // copy old arg strings data/perl-5.32.0/NetWare/NWUtil.c:472:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(pclp->m_argv[pclp->m_argc], new_arg); // Appended the new argument. data/perl-5.32.0/NetWare/NWUtil.c:697:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(pclp->m_argv[i], pclp->m_argv[i+1]); data/perl-5.32.0/NetWare/NWUtil.c:774:4: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(pXs, (char *)"%c%05.5s", letter, pPid); data/perl-5.32.0/NetWare/NWUtil.c:776:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(templatestr, 0) != 0) // File does not exist data/perl-5.32.0/NetWare/NWUtil.c:789:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(pXs, (char *)"%c%c%04.5s", letter1, letter, pPid); data/perl-5.32.0/NetWare/NWUtil.c:791:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(templatestr, 0) != 0) // File does not exist data/perl-5.32.0/NetWare/NWUtil.c:845:11: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. tptr += sprintf(tptr, (char *)"%s ", argv[k]); data/perl-5.32.0/NetWare/NWUtil.c:851:3: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system(tempCmd); data/perl-5.32.0/NetWare/Nwmain.c:167:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(NWDEFPERLTEMP, 0) != 0) data/perl-5.32.0/NetWare/Nwmain.c:183:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sNUL, NWDEFPERLROOT); data/perl-5.32.0/NetWare/Nwmain.c:185:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access((const char *)sNUL, 0) != 0) data/perl-5.32.0/NetWare/Nwmain.c:206:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cmdLineCopy, PERL_COMMAND_NAME); data/perl-5.32.0/NetWare/Nwmain.c:207:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cmdLineCopy, (char *)" "); // Space between the Perl Command and the input script name. data/perl-5.32.0/NetWare/Nwmain.c:208:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cmdLineCopy, sysCmdLine); // The command line parameters built into data/perl-5.32.0/NetWare/Nwmain.c:221:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(psdata->m_commandLine, cmdLineCopy); data/perl-5.32.0/NetWare/Nwmain.c:315:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sNUL, NWDEFPERLROOT); data/perl-5.32.0/NetWare/Nwmain.c:317:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access((const char *)sNUL, 0) == 0) data/perl-5.32.0/NetWare/Nwmain.c:382:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(psdata->m_commandLine, (char *)cmdLine); data/perl-5.32.0/NetWare/Nwmain.c:985:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf((char *)"\n\nPress any key to exit\n"); data/perl-5.32.0/NetWare/Nwmain.c:1125:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( both, var ); data/perl-5.32.0/NetWare/Nwmain.c:1126:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( both, (char *)"=" ); data/perl-5.32.0/NetWare/Nwmain.c:1127:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( both, val ); data/perl-5.32.0/NetWare/Nwmain.c:1132:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(env[cnt], both); data/perl-5.32.0/NetWare/Nwmain.c:1288:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(psdata->m_commandLine, cmdLine); data/perl-5.32.0/NetWare/Nwmain.c:1348:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(sPerlScreenName, "%s%s.%s.%s", PERL_COMMAND_NAME, data/perl-5.32.0/NetWare/Nwpipe.c:97:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ptpf->m_argv[dindex], ptpf->m_pipeCommand->m_argv[sindex]); data/perl-5.32.0/NetWare/Nwpipe.c:122:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ptpf->m_redirect, (char *)">"); data/perl-5.32.0/NetWare/Nwpipe.c:124:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ptpf->m_redirect, (char *)"(CLIB_OPT)/>"); data/perl-5.32.0/NetWare/Nwpipe.c:129:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ptpf->m_redirect, (char *)"<"); data/perl-5.32.0/NetWare/Nwpipe.c:131:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ptpf->m_redirect, (char *)"(CLIB_OPT)/<"); data/perl-5.32.0/NetWare/Nwpipe.c:133:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(ptpf->m_redirect, ptpf->m_fileName); data/perl-5.32.0/NetWare/Nwpipe.c:138:4: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(tbuf, (char *)" -{%x", ptpf->m_perlSynchSemaphore); data/perl-5.32.0/NetWare/Nwpipe.c:139:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(ptpf->m_redirect, tbuf); data/perl-5.32.0/NetWare/Nwpipe.c:142:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ptpf->m_argv[dindex], (char*) ptpf->m_redirect); data/perl-5.32.0/NetWare/Nwpipe.c:349:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(tempName, (char *)"\\plXXXXXX.tmp"); data/perl-5.32.0/NetWare/Nwpipe.c:358:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ptpf->m_fileName, tempName); data/perl-5.32.0/NetWare/intdef.h:49:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). #define strcpy(x,y) \ data/perl-5.32.0/NetWare/intdef.h:53:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). #define strcat(x,y) NWLstrbcpy((x + NWstrlen(x)), y, (NWstrlen(y) +1)) data/perl-5.32.0/NetWare/nw5.c:75:12: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return access(path, mode); data/perl-5.32.0/NetWare/nw5.c:288:14: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return (vfprintf(fp, format, args)); data/perl-5.32.0/NetWare/nw5.c:579:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buff, filename); data/perl-5.32.0/NetWare/nw5.c:737:13: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return (vprintf(format, args)); data/perl-5.32.0/NetWare/nw5.c:747:13: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return (vprintf(format, marker)); data/perl-5.32.0/NetWare/nw5.c:874:1: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execv(char *cmdname, char **argv) data/perl-5.32.0/NetWare/nw5.c:883:1: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(char *cmdname, char **argv) data/perl-5.32.0/NetWare/nw5.c:986:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cmd2, cmd); data/perl-5.32.0/XSUB.h:506:12: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. # undef getlogin data/perl-5.32.0/XSUB.h:543:13: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. # undef popen data/perl-5.32.0/XSUB.h:584:13: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define vfprintf PerlSIO_vprintf data/perl-5.32.0/XSUB.h:591:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. # define access PerlLIO_access data/perl-5.32.0/XSUB.h:604:13: [4] (tmpfile) mktemp: Temporary file race condition (CWE-377). # define mktemp PerlLIO_mktemp data/perl-5.32.0/XSUB.h:622:13: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. # define execl PerlProc_execl data/perl-5.32.0/XSUB.h:623:13: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. # define execv PerlProc_execv data/perl-5.32.0/XSUB.h:624:13: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. # define execvp PerlProc_execvp data/perl-5.32.0/XSUB.h:629:13: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. # define getlogin PerlProc_getlogin data/perl-5.32.0/XSUB.h:633:13: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. # define popen PerlProc_popen data/perl-5.32.0/amigaos4/amigaio.c:145:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(unix_pipe, "/PIPE/%s", pipe_name); data/perl-5.32.0/amigaos4/amigaio.c:146:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ami_pipe, "PIPE:%s", pipe_name); data/perl-5.32.0/amigaos4/amigaio.c:1008:16: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. #warning(using system!) data/perl-5.32.0/amigaos4/amigaio.c:1009:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(full, "%s %s %s ", interpreter_conv, data/perl-5.32.0/amigaos4/amigaio.c:1012:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(full, "%s %s ", interpreter_args, data/perl-5.32.0/amigaos4/amigaio.c:1028:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(full, "%s ", filename_conv); data/perl-5.32.0/amigaos4/amigaio.c:1079:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(full, buff); data/perl-5.32.0/amigaos4/amigaio.c:1085:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(full, *cur); data/perl-5.32.0/amigaos4/amigaio.c:1091:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(full, *cur); data/perl-5.32.0/amigaos4/amigaos.c:286:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(var, *envp); data/perl-5.32.0/amigaos4/amigaos.c:355:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s/%s", pathpart, filename); data/perl-5.32.0/amigaos4/amigaos.c:358:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s", filename); data/perl-5.32.0/amigaos4/amigaos.h:29:9: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. #define execvp(filename, argv) myexecvp(TRUE, filename, argv) data/perl-5.32.0/amigaos4/amigaos.h:30:9: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. #define execv(path, argv) myexecv(TRUE, path, argv) data/perl-5.32.0/amigaos4/amigaos.h:31:9: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. #define execl(path, ...) myexecl(TRUE, path, __VA_ARGS__) data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/bzlib.c:1424:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(mode2, writing ? "w" : "r" ); data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/bzlib_private.h:65:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf ( stderr, \ data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/bzlib_private.h:74:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,zf) data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/bzlib_private.h:76:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,zf,za1) data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/bzlib_private.h:78:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,zf,za1,za2) data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/bzlib_private.h:80:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,zf,za1,za2,za3) data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/bzlib_private.h:82:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,zf,za1,za2,za3,za4) data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/bzlib_private.h:84:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,zf,za1,za2,za3,za4,za5) data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/zutil.h:246:39: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Trace(x) {if (z_verbose>=0) fprintf x ;} data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/zutil.h:247:39: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracev(x) {if (z_verbose>0) fprintf x ;} data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/zutil.h:248:40: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracevv(x) {if (z_verbose>1) fprintf x ;} data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/zutil.h:249:48: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracec(c,x) {if (z_verbose>0 && (c)) fprintf x ;} data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/zutil.h:250:49: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracecv(c,x) {if (z_verbose>1 && (c)) fprintf x ;} data/perl-5.32.0/cpan/Digest-SHA/src/sha.c:476:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s->base64, out); data/perl-5.32.0/cpan/Digest-SHA/src/sha.c:479:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s->base64, out); data/perl-5.32.0/cpan/Win32API-File/const2perl.h:93:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( sVarName, sModName ); data/perl-5.32.0/cpan/Win32API-File/const2perl.h:155:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( sVarName, sModName ); \ data/perl-5.32.0/cygwin/cygwin.c:501:7: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. char system[PATH_MAX]; data/perl-5.32.0/cygwin/cygwin.c:505:47: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. cygwin_internal (CW_GET_CYGDRIVE_INFO, user, system, data/perl-5.32.0/cygwin/cygwin.c:509:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(flags, "%s,cygdrive,%s", user_flags, user); data/perl-5.32.0/cygwin/cygwin.c:511:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(flags, "%s,cygdrive,%s", system_flags, system); data/perl-5.32.0/cygwin/cygwin.c:511:60: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sprintf(flags, "%s,cygdrive,%s", system_flags, system); data/perl-5.32.0/cygwin/cygwin.c:523:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(flags, mnt->mnt_type); data/perl-5.32.0/cygwin/cygwin.c:526:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(flags, mnt->mnt_opts); data/perl-5.32.0/cygwin/cygwin.c:539:11: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. char system[PATH_MAX]; data/perl-5.32.0/cygwin/cygwin.c:543:51: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. cygwin_internal (CW_GET_CYGDRIVE_INFO, user, system, data/perl-5.32.0/cygwin/cygwin.c:548:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(flags, "%s,cygdrive,%s", user_flags, user); data/perl-5.32.0/cygwin/cygwin.c:553:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(flags, "%s,cygdrive,%s", system_flags, system); data/perl-5.32.0/cygwin/cygwin.c:553:54: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sprintf(flags, "%s,cygdrive,%s", system_flags, system); data/perl-5.32.0/djgpp/djgpp.c:37:27: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. l1->exit_status = system (cm); data/perl-5.32.0/djgpp/djgpp.c:46:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (l1->command, cm); data/perl-5.32.0/djgpp/djgpp.c:85:16: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. retval = system (l1->command); data/perl-5.32.0/djgpp/djgpp.c:193:39: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. result = convretcode (execl (shell,shell,unixysh ? "-c" : "/c",cmd,NULL),cmd,execf); data/perl-5.32.0/djgpp/djgpp.c:195:25: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. result = convretcode (system (cmd),cmd,execf); data/perl-5.32.0/djgpp/djgpp.c:219:12: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. rc=execvp (argv[0],argv); data/perl-5.32.0/djgpp/djgpp.c:285:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (pattern,name); data/perl-5.32.0/djgpp/djgpp.c:307:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (p1,pglob.gl_pathv[ic]); data/perl-5.32.0/djgpp/djgpp.c:417:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (expp,perlprefix); data/perl-5.32.0/djgpp/djgpp.c:427:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (expp,"/lib" PERL5); data/perl-5.32.0/doio.c:2684:24: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if ((access(s,F_OK) != -1)) data/perl-5.32.0/doio.c:2710:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if((access(s,F_OK) != -1)) data/perl-5.32.0/ext/SDBM_File/dba.c:28:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, p); data/perl-5.32.0/ext/SDBM_File/dbd.c:31:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, p); data/perl-5.32.0/ext/SDBM_File/tune.h:20:18: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define debug(x) printf x data/perl-5.32.0/ext/SDBM_File/util.c:17:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, s1, s2); data/perl-5.32.0/fakesdio.h:29:8: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #undef fprintf data/perl-5.32.0/fakesdio.h:34:8: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. #undef fscanf data/perl-5.32.0/fakesdio.h:45:8: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. #undef popen data/perl-5.32.0/fakesdio.h:57:8: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #undef vfprintf data/perl-5.32.0/fakesdio.h:58:8: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #undef printf data/perl-5.32.0/fakesdio.h:64:9: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define printf(fmt,args...) PerlIO_stdoutf(fmt,##args) data/perl-5.32.0/fakesdio.h:66:9: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define printf PerlIO_stdoutf data/perl-5.32.0/fakesdio.h:69:9: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define fprintf PerlIO_printf data/perl-5.32.0/fakesdio.h:77:9: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define vfprintf(f,fmt,a) PerlIO_vprintf(f,fmt,a) data/perl-5.32.0/fakesdio.h:102:9: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. #define popen(c,m) my_popen(c,m) data/perl-5.32.0/fakesdio.h:122:9: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. #define fscanf _CANNOT _fscanf_ data/perl-5.32.0/iperlsys.h:351:26: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define PerlSIO_printf fprintf data/perl-5.32.0/iperlsys.h:352:27: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define PerlSIO_stdoutf printf data/perl-5.32.0/iperlsys.h:353:34: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define PerlSIO_vprintf(f,fmt,a) vfprintf(f,fmt,a) data/perl-5.32.0/iperlsys.h:749:36: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. #define PerlLIO_access(file, mode) access((file), (mode)) data/perl-5.32.0/iperlsys.h:774:31: [4] (tmpfile) mktemp: Temporary file race condition (CWE-377). #define PerlLIO_mktemp(file) mktemp((file)) data/perl-5.32.0/iperlsys.h:1105:29: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. #define PerlProc_crypt(c,s) crypt((c), (s)) data/perl-5.32.0/iperlsys.h:1109:2: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl((c), (w), (x), (y), (z)) data/perl-5.32.0/iperlsys.h:1110:30: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. #define PerlProc_execv(c, a) execv((c), (a)) data/perl-5.32.0/iperlsys.h:1111:31: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. #define PerlProc_execvp(c, a) execvp((c), (a)) data/perl-5.32.0/iperlsys.h:1116:29: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. #define PerlProc_getlogin() getlogin() data/perl-5.32.0/nostdio.h:44:8: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #undef fprintf data/perl-5.32.0/nostdio.h:49:8: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. #undef fscanf data/perl-5.32.0/nostdio.h:60:8: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. #undef popen data/perl-5.32.0/nostdio.h:72:8: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #undef vfprintf data/perl-5.32.0/nostdio.h:73:8: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #undef printf data/perl-5.32.0/nostdio.h:75:9: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define fprintf _CANNOT _fprintf_ data/perl-5.32.0/nostdio.h:76:9: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define printf _CANNOT _printf_ data/perl-5.32.0/nostdio.h:89:9: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. #define fscanf _CANNOT _fscanf_ data/perl-5.32.0/nostdio.h:90:9: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define vfprintf(f,fmt,a) _CANNOT _vfprintf_ data/perl-5.32.0/nostdio.h:123:9: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. #define popen(c,m) _CANNOT _popen_ data/perl-5.32.0/os2/dl_os2.c:181:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf + len, ", possible problematic module: '%s'", fail); data/perl-5.32.0/os2/os2.c:1041:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tbuf, real_name); data/perl-5.32.0/os2/os2.c:1108:11: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. rc = execvp(real_name,argv); data/perl-5.32.0/os2/os2.c:1384:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(news, PL_sh_path); data/perl-5.32.0/os2/os2.c:1385:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(news + l, cmd + 7); data/perl-5.32.0/os2/os2.c:1426:22: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. rc = execl(shell,shell,copt,cmd,(char*)0); data/perl-5.32.0/os2/os2.c:1659:11: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. res = popen(cmd, mode); data/perl-5.32.0/os2/os2.c:1664:11: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. res = popen(cmd, mode); data/perl-5.32.0/os2/os2.c:1849:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tpath, p); data/perl-5.32.0/os2/os2.c:1851:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tpath + len + 1, TMPPATH1); data/perl-5.32.0/os2/os2.c:2139:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "%s%s[No description found in OSO001.MSG]", data/perl-5.32.0/os2/os2.c:2194:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, oname); data/perl-5.32.0/os2/os2.c:2210:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, orig); /* _execname() is always uppercased */ data/perl-5.32.0/os2/os2.c:2256:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mangle_ret, newp); data/perl-5.32.0/os2/os2.c:2402:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mangle_ret + tol, s + froml); data/perl-5.32.0/os2/os2.c:2450:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mangle_ret + newl, s + oldl); data/perl-5.32.0/os2/os2.c:4962:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(PL_sh_path, SH_PATH); data/perl-5.32.0/os2/os2.c:5053:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(str, tpath); data/perl-5.32.0/os2/os2.c:5088:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf,s); data/perl-5.32.0/os2/os2.c:5113:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf,s); data/perl-5.32.0/os2/os2.c:5356:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buffer, pat, value); data/perl-5.32.0/os2/perlrexx.c:100:2: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(s, sizeof(last_error) - (s - last_error), format, va); data/perl-5.32.0/os2/perlrexx.c:137:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(retstr->strptr, "%s", "ok"); data/perl-5.32.0/os2/perlrexx.c:164:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(retstr->strptr, "%s", "ok"); data/perl-5.32.0/os2/perlrexx.c:178:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(retstr->strptr, "%s", "ok"); data/perl-5.32.0/perl.h:1391:16: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. EXTERN_C char *crypt(const char *, const char *); data/perl-5.32.0/perl.h:1395:16: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. EXTERN_C char *crypt(const char *, const char *); data/perl-5.32.0/perl.h:1797:20: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define my_sprintf sprintf data/perl-5.32.0/perl.h:1822:58: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define my_snprintf(buffer, max, ...) ({ int len = snprintf(buffer, max, __VA_ARGS__); PERL_SNPRINTF_CHECK(len, max, snprintf); len; }) data/perl-5.32.0/perl.h:1822:124: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define my_snprintf(buffer, max, ...) ({ int len = snprintf(buffer, max, __VA_ARGS__); PERL_SNPRINTF_CHECK(len, max, snprintf); len; }) data/perl-5.32.0/perl.h:1825:43: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define my_snprintf(buffer, max, ...) snprintf(buffer, max, __VA_ARGS__) data/perl-5.32.0/perl.h:1836:59: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define my_vsnprintf(buffer, max, ...) ({ int len = vsnprintf(buffer, max, __VA_ARGS__); PERL_SNPRINTF_CHECK(len, max, vsnprintf); len; }) data/perl-5.32.0/perl.h:1836:126: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define my_vsnprintf(buffer, max, ...) ({ int len = vsnprintf(buffer, max, __VA_ARGS__); PERL_SNPRINTF_CHECK(len, max, vsnprintf); len; }) data/perl-5.32.0/perl.h:1839:44: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define my_vsnprintf(buffer, max, ...) vsnprintf(buffer, max, __VA_ARGS__) data/perl-5.32.0/perl.h:1866:79: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define PERL_MY_SNPRINTF_POST_GUARD(len, max) PERL_SNPRINTF_CHECK(len, max, snprintf) data/perl-5.32.0/perl.h:1872:80: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define PERL_MY_VSNPRINTF_POST_GUARD(len, max) PERL_SNPRINTF_CHECK(len, max, vsnprintf) data/perl-5.32.0/perl.h:4457:9: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. #ifndef crypt data/perl-5.32.0/perl.h:4458:7: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. char *crypt (const char*, const char*); data/perl-5.32.0/perl.h:4462:13: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. # ifndef getlogin data/perl-5.32.0/perl.h:4463:7: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. char *getlogin (void); data/perl-5.32.0/perlio.c:380:29: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. const STRLEN len2 = vsnprintf(buffer + len1, sizeof(buffer) - len1, fmt, ap); data/perl-5.32.0/perlio.c:5262:5: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, pat, arglist); data/perl-5.32.0/pp_sys.c:199:34: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. # define PERL_EFF_ACCESS(p,f) (access((p), (f) | EFF_ONLY_OK)) data/perl-5.32.0/pp_sys.c:258:11: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. res = access(path, mode); data/perl-5.32.0/pp_sys.c:3206:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. result = access(name, access_mode); data/perl-5.32.0/reentr.h:841:14: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. # undef crypt data/perl-5.32.0/reentr.h:842:20: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. # if !defined(crypt) && CRYPT_R_PROTO == REENTRANT_PROTO_B_CCS data/perl-5.32.0/reentr.h:843:17: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. # define crypt(a, b) crypt_r(a, b, PL_reentrant_buffer->_crypt_struct_buffer) data/perl-5.32.0/reentr.h:843:29: [4] (crypto) crypt_r: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. # define crypt(a, b) crypt_r(a, b, PL_reentrant_buffer->_crypt_struct_buffer) data/perl-5.32.0/reentr.h:845:20: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. # if !defined(crypt) && CRYPT_R_PROTO == REENTRANT_PROTO_B_CCD data/perl-5.32.0/reentr.h:846:17: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. # define crypt(a, b) crypt_r(a, b, &PL_reentrant_buffer->_crypt_data) data/perl-5.32.0/reentr.h:846:29: [4] (crypto) crypt_r: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. # define crypt(a, b) crypt_r(a, b, &PL_reentrant_buffer->_crypt_data) data/perl-5.32.0/reentr.h:848:19: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. # if defined(crypt) data/perl-5.32.0/reentr.h:1153:14: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. # undef getlogin data/perl-5.32.0/reentr.h:1154:20: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. # if !defined(getlogin) && GETLOGIN_R_PROTO == REENTRANT_PROTO_I_BW data/perl-5.32.0/reentr.h:1155:17: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. # define getlogin() ((PL_reentrant_retint = getlogin_r(PL_reentrant_buffer->_getlogin_buffer, PL_reentrant_buffer->_getlogin_size)) == 0 ? PL_reentrant_buffer->_getlogin_buffer : ((PL_reentrant_retint == ERANGE) ? (char *) Perl_reentrant_retry("getlogin") : 0)) data/perl-5.32.0/reentr.h:1157:20: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. # if !defined(getlogin) && GETLOGIN_R_PROTO == REENTRANT_PROTO_I_BI data/perl-5.32.0/reentr.h:1158:17: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. # define getlogin() ((PL_reentrant_retint = getlogin_r(PL_reentrant_buffer->_getlogin_buffer, PL_reentrant_buffer->_getlogin_size)) == 0 ? PL_reentrant_buffer->_getlogin_buffer : ((PL_reentrant_retint == ERANGE) ? (char *) Perl_reentrant_retry("getlogin") : 0)) data/perl-5.32.0/reentr.h:1160:20: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. # if !defined(getlogin) && GETLOGIN_R_PROTO == REENTRANT_PROTO_B_BW data/perl-5.32.0/reentr.h:1161:17: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. # define getlogin() getlogin_r(PL_reentrant_buffer->_getlogin_buffer, PL_reentrant_buffer->_getlogin_size) data/perl-5.32.0/reentr.h:1163:20: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. # if !defined(getlogin) && GETLOGIN_R_PROTO == REENTRANT_PROTO_B_BI data/perl-5.32.0/reentr.h:1164:17: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. # define getlogin() getlogin_r(PL_reentrant_buffer->_getlogin_buffer, PL_reentrant_buffer->_getlogin_size) data/perl-5.32.0/reentr.h:1166:19: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. # if defined(getlogin) data/perl-5.32.0/sbox32_hash.h:8:48: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define SBOX32_WARN6(pat,v0,v1,v2,v3,v4,v5) printf(pat, v0, v1, v2, v3, v4, v5) data/perl-5.32.0/sbox32_hash.h:9:48: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define SBOX32_WARN5(pat,v0,v1,v2,v3,v4) printf(pat, v0, v1, v2, v3, v4) data/perl-5.32.0/sbox32_hash.h:10:48: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define SBOX32_WARN4(pat,v0,v1,v2,v3) printf(pat, v0, v1, v2, v3) data/perl-5.32.0/sbox32_hash.h:11:48: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define SBOX32_WARN3(pat,v0,v1,v2) printf(pat, v0, v1, v2) data/perl-5.32.0/sbox32_hash.h:12:48: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define SBOX32_WARN2(pat,v0,v1) printf(pat, v0, v1) data/perl-5.32.0/sbox32_hash.h:13:41: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define NOTE3(pat,v0,v1,v2) printf(pat, v0, v1, v2) data/perl-5.32.0/sbox32_hash.h:20:41: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define NOTE3(pat,v0,v1,v2) printf(pat, v0, v1, v2) data/perl-5.32.0/symbian/symbian_proto.h:26:15: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). extern char *strcat(char *dst, const char *src); data/perl-5.32.0/symbian/symbian_proto.h:38:15: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). extern char* strcpy(char *dst, const char *src); data/perl-5.32.0/symbian/symbian_stubs.c:25:5: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. int execv(const char* path, char* const argv []) { return setENOSYS(); } data/perl-5.32.0/symbian/symbian_stubs.c:26:5: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. int execvp(const char* path, char* const argv []) { return setENOSYS(); } data/perl-5.32.0/symbian/symbian_stubs.c:29:7: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. FILE *popen(const char *command, const char *mode) { return 0; } data/perl-5.32.0/symbian/symbian_stubs.h:12:5: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. int execv(const char* path, char* const argv []); data/perl-5.32.0/symbian/symbian_stubs.h:13:5: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. int execvp(const char* path, char* const argv []); data/perl-5.32.0/symbian/symbian_stubs.h:16:7: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. FILE *popen(const char *command, const char *mode); data/perl-5.32.0/time64.c:107:35: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define TIME64_TRACE(format) (fprintf(stderr, format)) data/perl-5.32.0/time64.c:108:45: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define TIME64_TRACE1(format, var1) (fprintf(stderr, format, var1)) data/perl-5.32.0/time64.c:109:51: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define TIME64_TRACE2(format, var1, var2) (fprintf(stderr, format, var1, var2)) data/perl-5.32.0/time64.c:110:57: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define TIME64_TRACE3(format, var1, var2, var3) (fprintf(stderr, format, var1, var2, var3)) data/perl-5.32.0/util.c:5103:18: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. retval = vsnprintf(buffer, len, format, ap); data/perl-5.32.0/util.c:5105:18: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. retval = vsprintf(buffer, format, ap); data/perl-5.32.0/util.c:5150:14: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. retval = vsnprintf(buffer, len, format, apc); data/perl-5.32.0/util.c:5153:14: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. retval = vsprintf(buffer, format, apc); data/perl-5.32.0/util.c:5158:14: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. retval = vsnprintf(buffer, len, format, ap); data/perl-5.32.0/util.c:5161:14: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. retval = vsprintf(buffer, format, ap); data/perl-5.32.0/util.c:6142:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. cnt = snprintf(cmd, sizeof(cmd), ctx->format, data/perl-5.32.0/util.c:6149:8: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. #undef popen data/perl-5.32.0/util.c:6152:20: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. FILE* fp = popen(cmd, "r"); data/perl-5.32.0/vms/munchconfig.c:105:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(WorkString, argv[i]); data/perl-5.32.0/vms/munchconfig.c:111:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(TildeSub[TildeSubCount].Tag, WorkString); data/perl-5.32.0/vms/munchconfig.c:112:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(TildeSub[TildeSubCount].Value, TempValue); data/perl-5.32.0/vms/munchconfig.c:134:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(WorkString, LineBuffer); data/perl-5.32.0/vms/munchconfig.c:140:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(TildeSub[TildeSubCount].Tag, WorkString); data/perl-5.32.0/vms/munchconfig.c:141:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(TildeSub[TildeSubCount].Value, TempValue); data/perl-5.32.0/vms/munchconfig.c:190:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(TempValue, SecondaryLineBuffer); data/perl-5.32.0/vms/munchconfig.c:208:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ConfigSub[ConfigSubCount].Tag, LineBuffer); data/perl-5.32.0/vms/munchconfig.c:210:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ConfigSub[ConfigSubCount].Value, TempValue); data/perl-5.32.0/vms/munchconfig.c:380:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(TempBuffer, TildeSub[k].Value); data/perl-5.32.0/vms/munchconfig.c:391:11: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(TempBuffer, TempTilde); data/perl-5.32.0/vms/munchconfig.c:408:11: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(TempBuffer, TempTilde); data/perl-5.32.0/vms/munchconfig.c:434:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(TempBuffer, TempTilde); data/perl-5.32.0/vms/munchconfig.c:442:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(LineBuffer, TempBuffer); data/perl-5.32.0/vms/vms.c:3291:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(wmbx, mbx1); data/perl-5.32.0/vms/vms.c:3292:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(rmbx, mbx2); data/perl-5.32.0/vms/vms.c:3446:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(wmbx, mbx1); data/perl-5.32.0/vms/vms.c:3447:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(rmbx, mbx2); data/perl-5.32.0/vms/vms.c:3578:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(out, device); data/perl-5.32.0/vms/vms.c:3593:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(out, mbx); data/perl-5.32.0/vms/vms.c:4082:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(customization, cust_str, title); data/perl-5.32.0/vms/vms.c:4331:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(p,p+1); data/perl-5.32.0/vms/vms.c:4335:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(p,p+1); data/perl-5.32.0/vms/vms.c:6046:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(trndir,*dir == '/' ? dir + 1: dir); data/perl-5.32.0/vms/vms.c:6586:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, dir); data/perl-5.32.0/vms/vms.c:7486:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(vmspath,"\"^UP^%s\"",unixpath); data/perl-5.32.0/vms/vms.c:7601:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(vmspath,"\"^UP^%s\"",unixpath); data/perl-5.32.0/vms/vms.c:10104:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(dd->pattern, "%s*.*",dir); data/perl-5.32.0/vms/vms.c:10183:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(&text[i - 3], "%s;*", e->d_name); data/perl-5.32.0/vms/vms.c:11860:42: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. unsigned long int objtyp = ACL$C_FILE, access, retsts, privused, iosb[2], flags; data/perl-5.32.0/vms/vms.c:11864:40: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. struct itmlst_3 armlst[4] = {{sizeof access, CHP$_ACCESS, &access, &retlen}, data/perl-5.32.0/vms/vms.c:11864:62: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. struct itmlst_3 armlst[4] = {{sizeof access, CHP$_ACCESS, &access, &retlen}, data/perl-5.32.0/vms/vmsish.h:493:9: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. #define crypt(a,b) Perl_my_crypt(aTHX_ a,b) data/perl-5.32.0/win32/perlhost.h:1004:12: [4] (tmpfile) mktemp: Temporary file race condition (CWE-377). return mktemp(Template); data/perl-5.32.0/win32/perlhost.h:1541:12: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. return execl(cmdname, arg0, arg1, arg2, arg3); data/perl-5.32.0/win32/perlhost.h:2180:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*lpPtr, lpStr); data/perl-5.32.0/win32/perlhost.h:2187:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m_lppEnvList[m_dwEnvCount], lpStr); data/perl-5.32.0/win32/perlhost.h:2273:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(lpStr, lpEnvPtr); data/perl-5.32.0/win32/perlhost.h:2282:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(lpStr, lpEnvPtr); data/perl-5.32.0/win32/perlhost.h:2290:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(lpStr, lpLocalEnv); data/perl-5.32.0/win32/perlhost.h:2307:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(lpStr, lpLocalEnv); data/perl-5.32.0/win32/vdir.h:179:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ptr, pPath); data/perl-5.32.0/win32/vdir.h:192:3: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. wcscpy(dirTableW[index], wBuffer); data/perl-5.32.0/win32/vdir.h:252:6: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. wcscpy(ptr, pPath); data/perl-5.32.0/win32/vdir.h:264:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dirTableA[index], ansi); data/perl-5.32.0/win32/vdir.h:420:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(szBuffer, GetDirA(driveIndex)); data/perl-5.32.0/win32/vdir.h:421:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(szBuffer, &pInName[2]); data/perl-5.32.0/win32/vdir.h:435:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(szBuffer, GetDefaultDirA()); data/perl-5.32.0/win32/vdir.h:438:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&szBuffer[2], pInName); data/perl-5.32.0/win32/vdir.h:447:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(szBuffer, pInName); data/perl-5.32.0/win32/vdir.h:509:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&lpStr[4], lpDirStr); data/perl-5.32.0/win32/vdir.h:652:6: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. wcscpy(szBuffer, GetDirW(driveIndex)); data/perl-5.32.0/win32/vdir.h:653:6: [4] (buffer) wcscat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). wcscat(szBuffer, &pInName[2]); data/perl-5.32.0/win32/vdir.h:667:6: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. wcscpy(szBuffer, GetDefaultDirW()); data/perl-5.32.0/win32/vdir.h:670:3: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. wcscpy(&szBuffer[2], pInName); data/perl-5.32.0/win32/vdir.h:679:7: [4] (buffer) wcscat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). wcscat(szBuffer, pInName); data/perl-5.32.0/win32/vmem.h:42:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szBuffer, "%s %lx\n", str, x); data/perl-5.32.0/win32/vmem.h:1177:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(szBuffer, str, x, y, c); data/perl-5.32.0/win32/win32.c:92:10: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. # undef getlogin data/perl-5.32.0/win32/win32.c:93:11: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. # define getlogin g_getlogin data/perl-5.32.0/win32/win32.c:340:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mod_name, w32_module_name); data/perl-5.32.0/win32/win32.c:367:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(++ptr, trailing_path); data/perl-5.32.0/win32/win32.c:395:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buffer, "%s-%s", stdlib, pl); data/perl-5.32.0/win32/win32.c:417:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(regstr, "%s-%s", xlib, pl); data/perl-5.32.0/win32/win32.c:423:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(pathstr, "%s/%s/lib", libname, pl); data/perl-5.32.0/win32/win32.c:433:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(pathstr, "%s/lib", libname); data/perl-5.32.0/win32/win32.c:725:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cmd2, cmd); data/perl-5.32.0/win32/win32.c:856:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(scanname, filename); data/perl-5.32.0/win32/win32.c:914:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dirp->start, buffer); data/perl-5.32.0/win32/win32.c:933:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dirp->dirstr.d_name, dirp->curr); data/perl-5.32.0/win32/win32.c:977:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dirp->start + endpos, buffer); data/perl-5.32.0/win32/win32.c:1126:1: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. getlogin(void) data/perl-5.32.0/win32/win32.c:1664:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmpstart, fdata.cFileName); data/perl-5.32.0/win32/win32.c:1681:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(path,tmpbuf); data/perl-5.32.0/win32/win32.c:1876:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(curitem, name); data/perl-5.32.0/win32/win32.c:2091:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, " (%s)", g_osver.szCSDVersion); data/perl-5.32.0/win32/win32.c:2099:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name->nodename, hep->h_name); data/perl-5.32.0/win32/win32.c:2139:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name->machine, arch); data/perl-5.32.0/win32/win32.c:2719:13: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return (vfprintf(fp, format, marker)); data/perl-5.32.0/win32/win32.c:2728:13: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return (vprintf(format, marker)); data/perl-5.32.0/win32/win32.c:2734:13: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return (vfprintf(fp, format, args)); data/perl-5.32.0/win32/win32.c:2740:13: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return (vprintf(format, args)); data/perl-5.32.0/win32/win32.c:3163:26: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. ((aTHXa(PERL_GET_THX)), wcscpy(wOldName, PerlDir_mapW(wOldName)), data/perl-5.32.0/win32/win32.c:3218:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(szOldName, PerlDir_mapA(oname)); data/perl-5.32.0/win32/win32.c:3433:12: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return access(PerlDir_mapA(path), mode); data/perl-5.32.0/win32/win32.c:3561:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ptr, arg); data/perl-5.32.0/win32/win32.c:3638:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(curfullcmd, cmd); data/perl-5.32.0/win32/win32.c:3650:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(curfullcmd, exe_extensions[i]); data/perl-5.32.0/win32/win32.c:3745:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ptr, szfilename); data/perl-5.32.0/win32/win32.c:4227:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, filename); data/perl-5.32.0/win32/win32.h:272:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define snprintf _snprintf data/perl-5.32.0/win32/win32.h:272:18: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define snprintf _snprintf data/perl-5.32.0/win32/win32.h:273:9: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define vsnprintf _vsnprintf data/perl-5.32.0/win32/win32.h:424:15: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. extern char * getlogin(void); data/perl-5.32.0/win32/win32io.c:112:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access |= GENERIC_WRITE; data/perl-5.32.0/win32/win32io.c:123:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access |= GENERIC_READ; data/perl-5.32.0/win32/win32io.c:133:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access |= GENERIC_READ; data/perl-5.32.0/win32/win32io.c:151:24: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. h = CreateFile(path,access,share,NULL,create,attr,NULL); data/perl-5.32.0/win32/win32io.c:155:27: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. h = CreateFile(path,access,share,NULL,(create = OPEN_ALWAYS),attr,NULL); data/perl-5.32.0/win32/win32iop.h:209:8: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #undef fprintf data/perl-5.32.0/win32/win32iop.h:210:9: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define fprintf win32_fprintf data/perl-5.32.0/win32/win32iop.h:211:9: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define vfprintf win32_vfprintf data/perl-5.32.0/win32/win32iop.h:212:9: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define printf win32_printf data/perl-5.32.0/win32/win32iop.h:213:9: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define vprintf win32_vprintf data/perl-5.32.0/win32/win32iop.h:266:9: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. #define execv win32_execv data/perl-5.32.0/win32/win32iop.h:267:9: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. #define execvp win32_execvp data/perl-5.32.0/win32/win32iop.h:285:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. #define access(p,m) win32_access(p,m) data/perl-5.32.0/win32/win32iop.h:329:8: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. #undef crypt data/perl-5.32.0/win32/win32iop.h:330:9: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. #define crypt(t,s) win32_crypt(t,s) data/perl-5.32.0/zaphod32_hash.h:6:50: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define ZAPHOD32_WARN6(pat,v0,v1,v2,v3,v4,v5) printf(pat, v0, v1, v2, v3, v4, v5) data/perl-5.32.0/zaphod32_hash.h:7:50: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define ZAPHOD32_WARN5(pat,v0,v1,v2,v3,v4) printf(pat, v0, v1, v2, v3, v4) data/perl-5.32.0/zaphod32_hash.h:8:50: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define ZAPHOD32_WARN4(pat,v0,v1,v2,v3) printf(pat, v0, v1, v2, v3) data/perl-5.32.0/zaphod32_hash.h:9:50: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define ZAPHOD32_WARN3(pat,v0,v1,v2) printf(pat, v0, v1, v2) data/perl-5.32.0/zaphod32_hash.h:10:50: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define ZAPHOD32_WARN2(pat,v0,v1) printf(pat, v0, v1) data/perl-5.32.0/zaphod32_hash.h:11:41: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define NOTE3(pat,v0,v1,v2) printf(pat, v0, v1, v2) data/perl-5.32.0/zaphod32_hash.h:18:41: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define NOTE3(pat,v0,v1,v2) printf(pat, v0, v1, v2) data/perl-5.32.0/NetWare/NWUtil.c:94:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char* ret = getenv(name); data/perl-5.32.0/NetWare/nwperlhost.h:877:12: [3] (tmpfile) tmpnam: Temporary file race condition (CWE-377). return tmpnam(string); data/perl-5.32.0/NetWare/nwperlhost.h:1688:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. return getenv(varname); data/perl-5.32.0/NetWare/nwperlsys.h:236:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. return(getenv(varname)); data/perl-5.32.0/NetWare/nwperlsys.h:249:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *e = getenv(varname); data/perl-5.32.0/NetWare/nwperlsys.h:767:12: [3] (tmpfile) tmpnam: Temporary file race condition (CWE-377). return tmpnam(string); data/perl-5.32.0/NetWare/testnlm/type/type.c:27:24: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. defaultDir = (char *)getenv("PERL_ROOT"); data/perl-5.32.0/XSUB.h:559:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. # define getenv PerlEnv_getenv data/perl-5.32.0/XSUB.h:610:13: [3] (tmpfile) tmpnam: Temporary file race condition (CWE-377). # define tmpnam PerlLIO_tmpnam data/perl-5.32.0/amigaos4/amigaos.c:333:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!(path = getenv("PATH"))) data/perl-5.32.0/caretx.c:99:34: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. char *const tidied = realpath(SvPVX(caret_x), NULL); data/perl-5.32.0/djgpp/djgpp.c:24:44: [3] (tmpfile) tmpnam: Temporary file race condition (CWE-377). && (temp_name = malloc (L_tmpnam)) && tmpnam (temp_name)) data/perl-5.32.0/djgpp/djgpp.c:157:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((shell=getenv("SHELL"))==NULL && (shell=getenv("COMSPEC"))==NULL) data/perl-5.32.0/djgpp/djgpp.c:157:49: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((shell=getenv("SHELL"))==NULL && (shell=getenv("COMSPEC"))==NULL) data/perl-5.32.0/ext/DynaLoader/dlutils.c:118:29: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ( (perl_dl_nonlazy = getenv("PERL_DL_NONLAZY")) != NULL data/perl-5.32.0/ext/SDBM_File/dbe.c:52:1: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. getopt(int argc, char **argv, char *optstring) data/perl-5.32.0/ext/SDBM_File/dbe.c:225:16: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((opt = getopt(argc, argv, "acdfFm:rstvx")) != ':') { data/perl-5.32.0/ext/SDBM_File/dbu.c:11:12: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. extern int getopt(); data/perl-5.32.0/ext/SDBM_File/dbu.c:72:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt(argc, argv, "R")) != EOF) data/perl-5.32.0/inline.h:2616:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. return getenv(str); data/perl-5.32.0/inline.h:2621:11: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. ret = getenv(str); data/perl-5.32.0/iperlsys.h:780:30: [3] (tmpfile) tmpnam: Temporary file race condition (CWE-377). #define PerlLIO_tmpnam(str) tmpnam((str)) data/perl-5.32.0/malloc.c:1683:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *s = getenv("PERL_MALLOC_OPT"), *t = s; data/perl-5.32.0/os2/os2.c:697:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *s = getenv("PERL_ASIF_PM"); data/perl-5.32.0/os2/os2.c:1229:22: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *shell = getenv("EXECSHELL"); data/perl-5.32.0/os2/os2.c:1236:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. shell = getenv("OS2_SHELL"); data/perl-5.32.0/os2/os2.c:1360:18: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((shell = getenv("EMXSHELL")) != NULL) data/perl-5.32.0/os2/os2.c:1362:23: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. else if ((shell = getenv("SHELL")) != NULL) data/perl-5.32.0/os2/os2.c:1364:23: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. else if ((shell = getenv("COMSPEC")) != NULL) data/perl-5.32.0/os2/os2.c:1661:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *shell = getenv("EMXSHELL"); data/perl-5.32.0/os2/os2.c:1840:15: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *p = getenv("TMP"), *tpath; data/perl-5.32.0/os2/os2.c:1843:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!p) p = getenv("TEMP"); data/perl-5.32.0/os2/os2.c:1844:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!p) p = getenv("TMPDIR"); data/perl-5.32.0/os2/os2.c:2414:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. newp = getenv(name = "PERLLIB_" STRINGIFY(PERL_REVISION) data/perl-5.32.0/os2/os2.c:2418:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. newp = getenv(name = "PERLLIB_" STRINGIFY(PERL_REVISION) data/perl-5.32.0/os2/os2.c:2421:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. newp = getenv(name = "PERLLIB_" STRINGIFY(PERL_REVISION) "_PREFIX"); data/perl-5.32.0/os2/os2.c:2423:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. newp = getenv(name = "PERLLIB_PREFIX"); data/perl-5.32.0/os2/os2.c:4960:26: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. } else if ( (shell = getenv("PERL_SH_DRIVE")) ) { data/perl-5.32.0/os2/os2.c:4964:26: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. } else if ( (shell = getenv("PERL_SH_DIR")) ) { data/perl-5.32.0/os2/os2.c:4982:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. s = getenv("PERL_BEGINLIBPATH"); data/perl-5.32.0/os2/os2.c:4986:31: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. rc = fill_extLibpath(0, getenv("PERL_PRE_BEGINLIBPATH"), getenv("PERL_POST_BEGINLIBPATH"), 0, "PERL_(PRE/POST)_BEGINLIBPATH"); data/perl-5.32.0/os2/os2.c:4986:64: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. rc = fill_extLibpath(0, getenv("PERL_PRE_BEGINLIBPATH"), getenv("PERL_POST_BEGINLIBPATH"), 0, "PERL_(PRE/POST)_BEGINLIBPATH"); data/perl-5.32.0/os2/os2.c:4988:6: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. s = getenv("PERL_ENDLIBPATH"); data/perl-5.32.0/os2/os2.c:4992:30: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. rc = fill_extLibpath(1, getenv("PERL_PRE_ENDLIBPATH"), getenv("PERL_POST_ENDLIBPATH"), 0, "PERL_(PRE/POST)_ENDLIBPATH"); data/perl-5.32.0/os2/os2.c:4992:61: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. rc = fill_extLibpath(1, getenv("PERL_PRE_ENDLIBPATH"), getenv("PERL_POST_ENDLIBPATH"), 0, "PERL_(PRE/POST)_ENDLIBPATH"); data/perl-5.32.0/os2/os2.c:5042:8: [3] (tmpfile) tmpnam: Temporary file race condition (CWE-377). #undef tmpnam data/perl-5.32.0/os2/os2.c:5048:15: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *p = getenv("TMP"), *tpath; data/perl-5.32.0/os2/os2.c:5050:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!p) p = getenv("TEMP"); data/perl-5.32.0/os2/os2.c:5051:13: [3] (tmpfile) tempnam: Temporary file race condition (CWE-377). tpath = tempnam(p, "pltmp"); data/perl-5.32.0/os2/os2.c:5140:15: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *s = getenv("USE_PERL_FLOCK"); data/perl-5.32.0/os2/os2.c:5246:15: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *s = getenv("USE_PERL_PWENT"); data/perl-5.32.0/os2/os2.c:5321:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. s = getenv("PW_PASSWD"); data/perl-5.32.0/os2/os2ish.h:367:9: [3] (tmpfile) tmpnam: Temporary file race condition (CWE-377). #define tmpnam my_tmpnam data/perl-5.32.0/os2/os2ish.h:369:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define rand random data/perl-5.32.0/os2/os2ish.h:370:9: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define srand srandom data/perl-5.32.0/os2/os2ish.h:370:15: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define srand srandom data/perl-5.32.0/os2/os2ish.h:385:24: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. #define my_getenv(var) getenv(var) data/perl-5.32.0/plan9/plan9ish.h:126:24: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. #define my_getenv(var) getenv(var) data/perl-5.32.0/pp_sys.c:3729:12: [3] (misc) chroot: chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22). Make sure the program immediately chdir("/"), closes file descriptors, and drops root privileges, and that all necessary files (and no more!) are in the new root. PUSHi( chroot(tmps) >= 0 ); data/perl-5.32.0/reentr.h:1653:14: [3] (tmpfile) tmpnam: Temporary file race condition (CWE-377). # undef tmpnam data/perl-5.32.0/reentr.h:1654:20: [3] (tmpfile) tmpnam: Temporary file race condition (CWE-377). # if !defined(tmpnam) && TMPNAM_R_PROTO == REENTRANT_PROTO_B_B data/perl-5.32.0/reentr.h:1655:17: [3] (tmpfile) tmpnam: Temporary file race condition (CWE-377). # define tmpnam(a) tmpnam_r(a) data/perl-5.32.0/reentr.h:1657:19: [3] (tmpfile) tmpnam: Temporary file race condition (CWE-377). # if defined(tmpnam) data/perl-5.32.0/regen-configure/dist/lib/C/fake/getopt.C:75:12: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. V_FUNC(int getopt, (nargc, nargv, ostr) data/perl-5.32.0/vms/munchconfig.c:72:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt(argc, argv, "f:")) != -1) { data/perl-5.32.0/vms/vms.c:2169:3: [3] (tmpfile) tmpnam: Temporary file race condition (CWE-377). tmpnam(cp+strlen(cp)); data/perl-5.32.0/vms/vms.c:13412:7: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. char *realpath(const char *file_name, char * resolved_name, ...); data/perl-5.32.0/vms/vms.c:13576:16: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. rslt = realpath(filespec, outbuf); data/perl-5.32.0/vms/vmsish.h:88:10: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. # ifdef getenv data/perl-5.32.0/vms/vmsish.h:89:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. # undef getenv data/perl-5.32.0/vms/vmsish.h:92:11: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. # define getenv(v) Perl_my_getenv(aTHX_ v,TRUE) data/perl-5.32.0/win32/perlhost.h:1046:12: [3] (tmpfile) tmpnam: Temporary file race condition (CWE-377). return tmpnam(string); data/perl-5.32.0/win32/vmem.h:129:5: [3] (misc) InitializeCriticalSection: Exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. InitializeCriticalSection(&m_cs); data/perl-5.32.0/win32/vmem.h:222:5: [3] (misc) EnterCriticalSection: On some versions of Windows, exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. EnterCriticalSection(&m_cs); data/perl-5.32.0/win32/vmem.h:499:5: [3] (misc) InitializeCriticalSection: Exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. InitializeCriticalSection(&m_cs); data/perl-5.32.0/win32/vmem.h:870:5: [3] (misc) EnterCriticalSection: On some versions of Windows, exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. EnterCriticalSection(&m_cs); data/perl-5.32.0/win32/win32.c:2927:6: [3] (tmpfile) GetTempFileName: Temporary file race condition in certain cases (e.g., if run as SYSTEM in many versions of Windows) (CWE-377). if (GetTempFileName(prefix, "plx", 0, filename)) { data/perl-5.32.0/win32/win32iop.h:343:8: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. #undef getenv data/perl-5.32.0/win32/win32iop.h:344:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. #define getenv win32_getenv data/perl-5.32.0/win32/win32thread.h:17:23: [3] (misc) InitializeCriticalSection: Exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. #define MUTEX_INIT(m) InitializeCriticalSection(m) data/perl-5.32.0/win32/win32thread.h:18:23: [3] (misc) EnterCriticalSection: On some versions of Windows, exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. #define MUTEX_LOCK(m) EnterCriticalSection(m) data/perl-5.32.0/NetWare/NWUtil.c:733:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char numbuf[50]={'\0'}; data/perl-5.32.0/NetWare/Nwmain.c:73:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sPerlScreenName[MAX_DN_BYTES * sizeof(char)] = {'\0'}; data/perl-5.32.0/NetWare/Nwmain.c:145:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sysCmdLine[MAX_COMMAND_SIZE] = {'\0'}; data/perl-5.32.0/NetWare/Nwmain.c:146:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdLineCopy[sizeof(PERL_COMMAND_NAME)+sizeof(sysCmdLine)+2] = {'\0'}; data/perl-5.32.0/NetWare/Nwmain.c:181:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sNUL[MAX_DN_BYTES] = {'\0'}; data/perl-5.32.0/NetWare/Nwmain.c:184:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(sNUL, "\\nwnul"); data/perl-5.32.0/NetWare/Nwmain.c:190:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen((const char *)sNUL, (const char *)"w"); data/perl-5.32.0/NetWare/Nwmain.c:313:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sNUL[MAX_DN_BYTES] = {'\0'}; data/perl-5.32.0/NetWare/Nwmain.c:316:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(sNUL, "\\nwnul"); data/perl-5.32.0/NetWare/Nwmain.c:520:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curdir[_MAX_PATH] = {'\0'}; data/perl-5.32.0/NetWare/Nwmain.c:1099:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var[kMaxVariableNameLen+1] = {'\0'}; data/perl-5.32.0/NetWare/Nwmain.c:1100:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char val[kMaxValueLen+1] = {'\0'}; data/perl-5.32.0/NetWare/Nwmain.c:1101:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char both[kMaxVariableNameLen + kMaxValueLen + 5] = {'\0'}; data/perl-5.32.0/NetWare/Nwmain.c:1336:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sPerlRevision[32 * sizeof(char)] = {'\0'}; data/perl-5.32.0/NetWare/Nwmain.c:1337:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sPerlVersion[32 * sizeof(char)] = {'\0'}; data/perl-5.32.0/NetWare/Nwmain.c:1338:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sPerlSubVersion[32 * sizeof(char)] = {'\0'}; data/perl-5.32.0/NetWare/Nwpipe.c:137:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tbuf[15] = {'\0'}; data/perl-5.32.0/NetWare/Nwpipe.c:181:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tempName[_MAX_PATH] = {'\0'}; data/perl-5.32.0/NetWare/Nwpipe.c:357:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fclose(fopen(tempName, (char *)"w")); data/perl-5.32.0/NetWare/Nwpipe.c:424:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ptpf->m_file = fopen (ptpf->m_fileName, (char *)"r"); // Get the Pipe file handle data/perl-5.32.0/NetWare/Nwpipe.c:431:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ptpf->m_file = fopen(ptpf->m_fileName, (char *)"w"); data/perl-5.32.0/NetWare/Nwpipe.c:553:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curdir[_MAX_PATH] = {'\0'}; data/perl-5.32.0/NetWare/intdef.h:35:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). #define atoi NWLatoi data/perl-5.32.0/NetWare/nw5.c:254:12: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). return tmpfile(); data/perl-5.32.0/NetWare/nw5.c:425:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return (fopen(filename, mode)); data/perl-5.32.0/NetWare/nw5.c:583:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buff+len, "/*.*"); data/perl-5.32.0/NetWare/nw5.c:606:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return open(path, flag, pmode); data/perl-5.32.0/NetWare/nw5sck.c:30:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nwinet_scratch[18] = {'\0'}; data/perl-5.32.0/NetWare/nwperlhost.h:666:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mode[3]={'\0'}; data/perl-5.32.0/NetWare/nwperlhost.h:1585:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlMem, &perlMem, sizeof(perlMem)); data/perl-5.32.0/NetWare/nwperlhost.h:1586:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlMemShared, &perlMemShared, sizeof(perlMemShared)); data/perl-5.32.0/NetWare/nwperlhost.h:1587:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlMemParse, &perlMemParse, sizeof(perlMemParse)); data/perl-5.32.0/NetWare/nwperlhost.h:1588:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlEnv, &perlEnv, sizeof(perlEnv)); data/perl-5.32.0/NetWare/nwperlhost.h:1589:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlStdIO, &perlStdIO, sizeof(perlStdIO)); data/perl-5.32.0/NetWare/nwperlhost.h:1590:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlLIO, &perlLIO, sizeof(perlLIO)); data/perl-5.32.0/NetWare/nwperlhost.h:1591:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlDir, &perlDir, sizeof(perlDir)); data/perl-5.32.0/NetWare/nwperlhost.h:1592:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlSock, &perlSock, sizeof(perlSock)); data/perl-5.32.0/NetWare/nwperlhost.h:1593:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlProc, &perlProc, sizeof(perlProc)); data/perl-5.32.0/NetWare/nwperlhost.h:1627:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlMem, &perlMem, sizeof(perlMem)); data/perl-5.32.0/NetWare/nwperlhost.h:1628:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlMemShared, &perlMemShared, sizeof(perlMemShared)); data/perl-5.32.0/NetWare/nwperlhost.h:1629:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlMemParse, &perlMemParse, sizeof(perlMemParse)); data/perl-5.32.0/NetWare/nwperlhost.h:1630:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlEnv, &perlEnv, sizeof(perlEnv)); data/perl-5.32.0/NetWare/nwperlhost.h:1631:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlStdIO, &perlStdIO, sizeof(perlStdIO)); data/perl-5.32.0/NetWare/nwperlhost.h:1632:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlLIO, &perlLIO, sizeof(perlLIO)); data/perl-5.32.0/NetWare/nwperlhost.h:1633:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlDir, &perlDir, sizeof(perlDir)); data/perl-5.32.0/NetWare/nwperlhost.h:1634:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlSock, &perlSock, sizeof(perlSock)); data/perl-5.32.0/NetWare/nwperlhost.h:1635:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlProc, &perlProc, sizeof(perlProc)); data/perl-5.32.0/NetWare/nwperlhost.h:1651:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlMem, &perlMem, sizeof(perlMem)); data/perl-5.32.0/NetWare/nwperlhost.h:1652:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlMemShared, &perlMemShared, sizeof(perlMemShared)); data/perl-5.32.0/NetWare/nwperlhost.h:1653:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlMemParse, &perlMemParse, sizeof(perlMemParse)); data/perl-5.32.0/NetWare/nwperlhost.h:1654:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlEnv, &perlEnv, sizeof(perlEnv)); data/perl-5.32.0/NetWare/nwperlhost.h:1655:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlStdIO, &perlStdIO, sizeof(perlStdIO)); data/perl-5.32.0/NetWare/nwperlhost.h:1656:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlLIO, &perlLIO, sizeof(perlLIO)); data/perl-5.32.0/NetWare/nwperlhost.h:1657:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlDir, &perlDir, sizeof(perlDir)); data/perl-5.32.0/NetWare/nwperlhost.h:1658:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlSock, &perlSock, sizeof(perlSock)); data/perl-5.32.0/NetWare/nwperlhost.h:1659:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m_hostperlProc, &perlProc, sizeof(perlProc)); data/perl-5.32.0/NetWare/nwperlsys.h:557:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mode[3]={'\0'}; data/perl-5.32.0/NetWare/nwplglob.c:57:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). redirOut = fopen((const char *)fileName, (const char *)"w"); data/perl-5.32.0/NetWare/testnlm/type/type.c:36:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). pfile = fopen(argv[k],"r"); data/perl-5.32.0/Porting/timecheck.c:16:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char hexbuf[80]; data/perl-5.32.0/Porting/timecheck.c:20:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (hexbuf, " -0x%016lx", -t); data/perl-5.32.0/Porting/timecheck.c:22:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (hexbuf, " 0x%016lx", t); data/perl-5.32.0/XSUB.h:564:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). # define fopen PerlSIO_fopen data/perl-5.32.0/XSUB.h:590:13: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). # define tmpfile PerlSIO_tmpfile data/perl-5.32.0/XSUB.h:605:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). # define open PerlLIO_open data/perl-5.32.0/amigaos4/amigaio.c:79:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *argv[4]; data/perl-5.32.0/amigaos4/amigaio.c:111:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pipe_name[50]; data/perl-5.32.0/amigaos4/amigaio.c:112:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char unix_pipe[50]; data/perl-5.32.0/amigaos4/amigaio.c:113:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ami_pipe[50]; data/perl-5.32.0/amigaos4/amigaio.c:143:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(pipe_name, "%x%08lx/4096/0", pipenum++, data/perl-5.32.0/amigaos4/amigaio.c:663:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cmd, incmd, cmdlen); data/perl-5.32.0/amigaos4/amigaio.c:903:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #undef fopen data/perl-5.32.0/amigaos4/amigaio.c:916:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1000]; data/perl-5.32.0/amigaos4/amigaio.c:954:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fh = fopen(filename, "r"); data/perl-5.32.0/amigaos4/amigaio.c:1086:6: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(full, "\" "); data/perl-5.32.0/amigaos4/amigaos.c:168:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pipe_name[1024]; data/perl-5.32.0/amigaos4/amigaos.c:172:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(pipe_name, "/T/%x.%08lx", pipenum++, IUtility->GetUniqueID()); data/perl-5.32.0/amigaos4/amigaos.c:174:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(pipe_name, "/PIPE/%x%08lx/4096/0", pipenum++, data/perl-5.32.0/amigaos4/amigaos.c:180:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). filedes[1] = open(pipe_name, O_WRONLY | O_CREAT); data/perl-5.32.0/amigaos4/amigaos.c:181:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). filedes[0] = open(pipe_name, O_RDONLY); data/perl-5.32.0/amigaos4/amigaos.c:351:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pathpart, path, p - path); data/perl-5.32.0/amigaos4/amigaos.c:395:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[1024]; /* 1024 enough? let's hope so! */ data/perl-5.32.0/amigaos4/amigaos.c:455:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char varbuf[8]; data/perl-5.32.0/amigaos4/amigaos.c:561:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[120]; data/perl-5.32.0/caretx.c:92:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1]; data/perl-5.32.0/caretx.c:111:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN]; data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/bzlib.c:1397:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char unused[BZ_MAX_UNUSED]; data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/bzlib.c:1400:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mode2[10] = ""; data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/bzlib.c:1432:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(path,mode2); data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/crc32.c:143:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen("crc32.h", "w"); data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/inflate.c:640:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hbuf[4]; /* buffer for gzip header crc calculation */ data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/inflate.c:1423:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[4]; /* to restore bit buffer to byte string */ data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/trees.c:328:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *header = fopen("trees.h", "w"); data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/zutil.c:13:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. z_const char * const z_errmsg[10] = { data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/zutil.h:53:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern z_const char * const z_errmsg[10]; /* indexed by 2-zlib_error */ data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/zutil.h:113:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fopen((name), (mode), "mbc=60", "ctx=stm", "rfm=fix", "mrs=512") data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/zutil.h:206:30: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). # define F_OPEN(name, mode) fopen((name), (mode)) data/perl-5.32.0/cpan/Compress-Raw-Zlib/zlib-src/zutil.h:230:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define zmemcpy memcpy data/perl-5.32.0/cpan/DB_File/version.c:67:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[40] ; data/perl-5.32.0/cpan/DB_File/version.c:68:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, "%d.%d", Major, Minor) ; data/perl-5.32.0/cpan/DB_File/version.c:70:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, "%d.%03d%03d", Major, Minor, Patch) ; data/perl-5.32.0/cpan/Digest-SHA/src/sha.c:468:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[5]; data/perl-5.32.0/cpan/Digest-SHA/src/sha.h:143:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char block[SHA_MAX_BLOCK_BITS/8]; data/perl-5.32.0/cpan/Digest-SHA/src/sha.h:147:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[SHA_MAX_DIGEST_BITS/8]; data/perl-5.32.0/cpan/Digest-SHA/src/sha.h:149:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hex[SHA_MAX_HEX_LEN+1]; data/perl-5.32.0/cpan/Digest-SHA/src/sha.h:150:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char base64[SHA_MAX_BASE64_LEN+1]; data/perl-5.32.0/cpan/Digest-SHA/src/sha.h:157:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char key[SHA_MAX_BLOCK_BITS/8]; data/perl-5.32.0/cpan/Encode/Encode/encode.h:71:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const name[2]; /* name(s) of this encoding */ data/perl-5.32.0/cpan/Win32API-File/const2perl.h:83:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msBuf[64]; /* Must fit sprintf of longest NV */ data/perl-5.32.0/cpan/Win32API-File/const2perl.h:94:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( sVarName, "::EXPORT_FAIL" ); data/perl-5.32.0/cpan/Win32API-File/const2perl.h:156:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( sVarName, "::EXPORT_FAIL" ); \ data/perl-5.32.0/cygwin/cygwin.c:96:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *command[4]; data/perl-5.32.0/cygwin/cygwin.c:491:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char flags[PATH_MAX]; data/perl-5.32.0/cygwin/cygwin.c:500:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char user[PATH_MAX]; data/perl-5.32.0/cygwin/cygwin.c:501:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char system[PATH_MAX]; data/perl-5.32.0/cygwin/cygwin.c:502:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char user_flags[PATH_MAX]; data/perl-5.32.0/cygwin/cygwin.c:503:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char system_flags[PATH_MAX]; data/perl-5.32.0/cygwin/cygwin.c:538:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char user[PATH_MAX]; data/perl-5.32.0/cygwin/cygwin.c:539:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char system[PATH_MAX]; data/perl-5.32.0/cygwin/cygwin.c:540:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char user_flags[PATH_MAX]; data/perl-5.32.0/cygwin/cygwin.c:541:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char system_flags[PATH_MAX]; data/perl-5.32.0/djgpp/djgpp.c:39:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). l1->fp = fopen (temp_name, md); data/perl-5.32.0/djgpp/djgpp.c:47:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). l1->fp = fopen (temp_name, md); data/perl-5.32.0/djgpp/djgpp.c:332:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (buf,gi->pos+gi->matches,siz); data/perl-5.32.0/djgpp/djgpp.c:361:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[PATH_MAX+2]; data/perl-5.32.0/djgpp/djgpp.c:383:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char p[MAXPATHLEN]; data/perl-5.32.0/djgpp/djgpp.c:416:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char expp[PATH_MAX]; data/perl-5.32.0/djgpp/djgpp.c:421:13: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (expp,"/bin"); data/perl-5.32.0/djgpp/djgpp.c:424:13: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (expp,"/lib" PERL5 "/site"); data/perl-5.32.0/djgpp/djgpp.c:447:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (perlprefix,".."); data/perl-5.32.0/doio.c:452:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mode[PERL_MODE_MAX]; /* file mode ("r\0", "rb\0", "ab\0" etc.) */ data/perl-5.32.0/doio.c:521:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mode[PERL_MODE_MAX]; /* file mode ("r\0", "rb\0", "ab\0" etc.) */ data/perl-5.32.0/doio.c:976:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[256]; data/perl-5.32.0/doio.c:1016:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newname[FILENAME_MAX+1]; data/perl-5.32.0/doio.c:2365:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cmd, incmd, cmdlen); data/perl-5.32.0/doio.c:2374:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char flags[PERL_FLAGS_MAX]; data/perl-5.32.0/dump.c:156:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char octbuf[PV_ESCAPE_OCTBUFSIZE] = "%123456789ABCDF"; data/perl-5.32.0/ext/File-Glob/bsd_glob.c:454:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. if (((char *) patbuf)[0] == BG_EOS) { data/perl-5.32.0/ext/File-Glob/bsd_glob.c:748:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN]; data/perl-5.32.0/ext/File-Glob/bsd_glob.c:1020:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN]; data/perl-5.32.0/ext/File-Glob/bsd_glob.c:1038:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN]; data/perl-5.32.0/ext/File-Glob/bsd_glob.c:1054:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN]; data/perl-5.32.0/ext/SDBM_File/dba.c:29:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(name + n, ".pag"); data/perl-5.32.0/ext/SDBM_File/dba.c:31:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((pagf = open(name, O_RDONLY)) < 0) data/perl-5.32.0/ext/SDBM_File/dba.c:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pag[PBLKSIZ]; data/perl-5.32.0/ext/SDBM_File/dbd.c:32:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(name + n, ".pag"); data/perl-5.32.0/ext/SDBM_File/dbd.c:34:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((pagf = open(name, O_RDONLY)) < 0) data/perl-5.32.0/ext/SDBM_File/dbd.c:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pag[PBLKSIZ]; data/perl-5.32.0/ext/SDBM_File/dbe.c:215:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *comarg[3]; data/perl-5.32.0/ext/SDBM_File/pair.c:76:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (void) memcpy(pag + off, key.dptr, key.dsize); data/perl-5.32.0/ext/SDBM_File/pair.c:82:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (void) memcpy(pag + off, val.dptr, val.dsize); data/perl-5.32.0/ext/SDBM_File/pair.c:239:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cur[PBLKSIZ]; data/perl-5.32.0/ext/SDBM_File/pair.c:242:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (void) memcpy(cur, pag, PBLKSIZ); data/perl-5.32.0/ext/SDBM_File/sdbm.c:99:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dirname, file, filelen); data/perl-5.32.0/ext/SDBM_File/sdbm.c:100:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dirname + filelen, DIRFEXT, dirfext_size); data/perl-5.32.0/ext/SDBM_File/sdbm.c:102:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pagname, file, filelen); data/perl-5.32.0/ext/SDBM_File/sdbm.c:103:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pagname + filelen, PAGFEXT, pagfext_size); data/perl-5.32.0/ext/SDBM_File/sdbm.c:140:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((db->pagf = open(pagname, flags, mode)) > -1) { data/perl-5.32.0/ext/SDBM_File/sdbm.c:141:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((db->dirf = open(dirname, flags, mode)) > -1) { data/perl-5.32.0/ext/SDBM_File/sdbm.c:291:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char twin[PBLKSIZ]; data/perl-5.32.0/ext/SDBM_File/sdbm.c:293:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zer[PBLKSIZ]; data/perl-5.32.0/ext/SDBM_File/sdbm.c:343:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (void) memcpy(pag, New, PBLKSIZ); data/perl-5.32.0/ext/SDBM_File/sdbm.h:33:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pagbuf[PBLKSIZ]; /* page file block buffer */ data/perl-5.32.0/ext/SDBM_File/sdbm.h:35:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirbuf[DBLKSIZ]; /* directory file block buffer */ data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:67:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__GetCwd [sizeof("Win32::GetCwd")]; data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:68:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__SetCwd [sizeof("Win32::SetCwd")]; data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:69:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__GetNextAvailDrive [sizeof("Win32::GetNextAvailDrive")]; data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__GetLastError [sizeof("Win32::GetLastError")]; data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:71:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__SetLastError [sizeof("Win32::SetLastError")]; data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:72:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__LoginName [sizeof("Win32::LoginName")]; data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:73:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__NodeName [sizeof("Win32::NodeName")]; data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:74:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__DomainName [sizeof("Win32::DomainName")]; data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:75:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__FsType [sizeof("Win32::FsType")]; data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:76:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__GetOSVersion [sizeof("Win32::GetOSVersion")]; data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:77:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__IsWinNT [sizeof("Win32::IsWinNT")]; data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__IsWin95 [sizeof("Win32::IsWin95")]; data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:79:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__FormatMessage [sizeof("Win32::FormatMessage")]; data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:80:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__Spawn [sizeof("Win32::Spawn")]; data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:81:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__GetTickCount [sizeof("Win32::GetTickCount")]; data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:82:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__GetShortPathName [sizeof("Win32::GetShortPathName")]; data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:83:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__GetFullPathName [sizeof("Win32::GetFullPathName")]; data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:84:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__GetLongPathName [sizeof("Win32::GetLongPathName")]; data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__CopyFile [sizeof("Win32::CopyFile")]; data/perl-5.32.0/ext/Win32CORE/Win32CORE.c:86:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Win32__Sleep [sizeof("Win32::Sleep")]; data/perl-5.32.0/ext/XS-Typemap/stdio.c:16:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). stream = fopen( path, "w"); data/perl-5.32.0/fakesdio.h:28:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #undef fopen data/perl-5.32.0/fakesdio.h:55:8: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). #undef tmpfile data/perl-5.32.0/fakesdio.h:73:9: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). #define tmpfile() PerlIO_tmpfile() data/perl-5.32.0/fakesdio.h:76:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define fopen(p,m) PerlIO_open(p,m) data/perl-5.32.0/generate_uudmap.c:77:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *const out = fopen(filename, "w"); data/perl-5.32.0/generate_uudmap.c:103:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char PL_uudmap[256]; data/perl-5.32.0/generate_uudmap.c:104:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char PL_bitcount[256]; data/perl-5.32.0/gv.c:104:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char smallbuf[128]; data/perl-5.32.0/gv.c:122:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpbuf + 2, name, namelen); data/perl-5.32.0/gv.c:1487:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char smallbuf[128]; data/perl-5.32.0/gv.c:1653:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char smallbuf[64]; /* small buffer to avoid a malloc when possible */ data/perl-5.32.0/handy.h:2605:91: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define Copy(s,d,n,t) (MEM_WRAP_CHECK_(n,t) perl_assert_ptr(d), perl_assert_ptr(s), (void)memcpy((char*)(d),(const char*)(s), (n) * sizeof(t))) data/perl-5.32.0/handy.h:2610:86: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define CopyD(s,d,n,t) (MEM_WRAP_CHECK_(n,t) perl_assert_ptr(d), perl_assert_ptr(s), memcpy((char*)(d),(const char*)(s), (n) * sizeof(t))) data/perl-5.32.0/hv.h:53:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hek_key[1]; /* variable-length hash key */ data/perl-5.32.0/hv.h:574:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char refcounted_he_data[1]; data/perl-5.32.0/iperlsys.h:289:29: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define PerlSIO_fopen(x,y) fopen(x,y) data/perl-5.32.0/iperlsys.h:359:28: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). #define PerlSIO_tmpfile() tmpfile() data/perl-5.32.0/iperlsys.h:775:34: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define PerlLIO_open(file, flag) open((file), (flag)) data/perl-5.32.0/iperlsys.h:776:41: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define PerlLIO_open3(file, flag, perm) open((file), (flag), (perm)) data/perl-5.32.0/locale.c:1609:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bad_chars_list[ (94 * 4) + (3 * 5) + 1 ] = { '\0' }; data/perl-5.32.0/locale.c:1637:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[4] = { '\0' }; data/perl-5.32.0/locale.c:2107:13: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). MultiByteToWideChar(CP_UTF8, 0, locale, -1, NULL, 0); data/perl-5.32.0/locale.c:2115:14: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). if (!MultiByteToWideChar(CP_UTF8, 0, locale, -1, wlocale, req_size)) { data/perl-5.32.0/locale.c:3330:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * sl_result[NOMINAL_LC_ALL_INDEX + 1]; data/perl-5.32.0/locale.c:3334:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * curlocales[NOMINAL_LC_ALL_INDEX + 1]; data/perl-5.32.0/locale.c:4634:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[CUR_LC_BUFFER_SIZE]; /* small buffer */ data/perl-5.32.0/locale.c:5110:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * cutoff = (char *) my_memrchr(utf8ness_cache, data/perl-5.32.0/locale.c:5606:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ret[256] = "If you can read this, thank your buggy C" data/perl-5.32.0/malloc.c:396:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sstrut[MEM_ALIGNBYTES]; /* for the sizing */ data/perl-5.32.0/malloc.c:1084:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuf[10]; data/perl-5.32.0/malloc.c:1280:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[80]; data/perl-5.32.0/malloc.c:2122:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80]; data/perl-5.32.0/mg.c:952:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[255]; data/perl-5.32.0/mg.c:1317:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathbuf[256], eltbuf[256], *cp, *elt; data/perl-5.32.0/mg.c:1348:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[256]; data/perl-5.32.0/mg_vtable.h:99:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. EXTCONST char * const PL_magic_vtable_names[magic_vtable_max] = { data/perl-5.32.0/mg_vtable.h:134:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. EXTCONST char * const PL_magic_vtable_names[magic_vtable_max]; data/perl-5.32.0/nostdio.h:43:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #undef fopen data/perl-5.32.0/nostdio.h:70:8: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). #undef tmpfile data/perl-5.32.0/nostdio.h:81:9: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). #define tmpfile() _CANNOT _tmpfile_ data/perl-5.32.0/nostdio.h:85:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define fopen(p,m) _CANNOT _fopen_ data/perl-5.32.0/op.c:14018:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[256]; data/perl-5.32.0/op.c:18224:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[ MAX_ARGS_OP * 2 + 2 ]; /* One ';', one '\0' */ data/perl-5.32.0/os2/dl_os2.c:11:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char fail[300]; data/perl-5.32.0/os2/dl_os2.c:57:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[260]; data/perl-5.32.0/os2/dl_os2.c:82:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[260]; data/perl-5.32.0/os2/dl_os2.c:90:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dllname[260]; data/perl-5.32.0/os2/dl_os2.c:96:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(fail, "can't find my DLL name by the handle"); data/perl-5.32.0/os2/dl_os2.c:102:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(fail, "can't load my own DLL"); data/perl-5.32.0/os2/dl_os2.c:110:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(fail, "can't load from myself: compiled without -DDLOPEN_INITTERM"); data/perl-5.32.0/os2/dl_os2.c:166:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[700]; data/perl-5.32.0/os2/os2.c:136:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char po2_fname[9]; data/perl-5.32.0/os2/os2.c:146:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char po2_mangle_ret[STATIC_FILE_LENGTH+1]; data/perl-5.32.0/os2/os2.c:154:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char po2_pthreads_state_buf[80]; data/perl-5.32.0/os2/os2.c:155:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char po2_os2error_buf[300]; data/perl-5.32.0/os2/os2.c:345:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80]; data/perl-5.32.0/os2/os2.c:368:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80]; data/perl-5.32.0/os2/os2.c:699:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (!s || !atoi(s)) { data/perl-5.32.0/os2/os2.c:722:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[20], *s = (char*)loadOrdinals[ord].entryname; data/perl-5.32.0/os2/os2.c:727:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s = buf, "%d", loadOrdinals[ord].entrypoint); data/perl-5.32.0/os2/os2.c:985:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const * args[4]; data/perl-5.32.0/os2/os2.c:986:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const fargs[4] data/perl-5.32.0/os2/os2.c:1037:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tbuf[512]; data/perl-5.32.0/os2/os2.c:1042:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(tbuf + l, ".exe"); data/perl-5.32.0/os2/os2.c:1222:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *exec_args[2]; data/perl-5.32.0/os2/os2.c:2095:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(os2error_buf, "SYS%04d=%#x: ", rc, rc); data/perl-5.32.0/os2/os2.c:2104:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(os2error_buf, "SYS%04d=%#x: ", rc, rc); data/perl-5.32.0/os2/os2.c:2181:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf,o,ll); data/perl-5.32.0/os2/os2.c:2224:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[300], *p = execname2buffer(buf, sizeof buf, PL_origargv[0]); data/perl-5.32.0/os2/os2.c:2234:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *s, b[300]; data/perl-5.32.0/os2/os2.c:2302:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b, INSTALL_PREFIX, tol + 1); data/perl-5.32.0/os2/os2.c:2380:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(e, s, l); data/perl-5.32.0/os2/os2.c:2401:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mangle_ret, to, tol); data/perl-5.32.0/os2/os2.c:2425:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *s, b[300]; data/perl-5.32.0/os2/os2.c:3471:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char p[MAXPATHLEN]; data/perl-5.32.0/os2/os2.c:3492:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char p[MAXPATHLEN]; data/perl-5.32.0/os2/os2.c:3522:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char p1[MAXPATHLEN]; data/perl-5.32.0/os2/os2.c:3563:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char p1[MAXPATHLEN]; data/perl-5.32.0/os2/os2.c:3663:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char to[1024]; data/perl-5.32.0/os2/os2.c:3717:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2048], *to = buf, buf1[300], *s; data/perl-5.32.0/os2/os2.c:3734:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(to, pre, l); data/perl-5.32.0/os2/os2.c:3765:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(to, post, l); data/perl-5.32.0/os2/os2.c:3790:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN]; data/perl-5.32.0/os2/os2.c:4112:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *s, buf[10], *s1, *perltype = NULL; data/perl-5.32.0/os2/os2.c:4141:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8192]; data/perl-5.32.0/os2/os2.c:4388:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/perl-5.32.0/os2/os2.c:4633:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char options[64]; data/perl-5.32.0/os2/os2.c:4662:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/perl-5.32.0/os2/os2.c:4665:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[48*1024]; /* _emx_init() requires 32K, cmd.exe has 64K only */ data/perl-5.32.0/os2/os2.c:4713:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, data/perl-5.32.0/os2/os2.c:4721:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "ExceptionHandler misplaced: %#lx != %#lx\n", data/perl-5.32.0/os2/os2.c:4727:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf + strlen(buf), data/perl-5.32.0/os2/os2.c:4736:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf + strlen(buf), data/perl-5.32.0/os2/os2.c:4845:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80]; data/perl-5.32.0/os2/os2.c:4848:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, data/perl-5.32.0/os2/os2.c:4959:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(PL_sh_path, perl_sh_installed, l + 1); data/perl-5.32.0/os2/os2.c:4971:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(PL_sh_path + l, "/sh.exe"); data/perl-5.32.0/os2/os2.c:4995:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/perl-5.32.0/os2/os2.c:5043:8: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). #undef tmpfile data/perl-5.32.0/os2/os2.c:5066:9: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). return tmpfile(); data/perl-5.32.0/os2/os2.c:5068:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return fopen(my_tmpnam(NULL), "w+b"); /* Race condition, but data/perl-5.32.0/os2/os2.c:5080:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b[MAXPATHLEN]; data/perl-5.32.0/os2/os2.c:5105:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b[MAXPATHLEN]; data/perl-5.32.0/os2/os2.c:5142:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). use_my_flock = atoi(s); data/perl-5.32.0/os2/os2.c:5248:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). _my_pwent = atoi(s); data/perl-5.32.0/os2/os2.c:5353:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pat[12]; data/perl-5.32.0/os2/os2.c:5355:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(pat, "%%.%dg", digits); data/perl-5.32.0/os2/os2.c:5382:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dllname[260], fail[260]; data/perl-5.32.0/os2/os2ish.h:366:9: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). #define tmpfile my_tmpfile data/perl-5.32.0/os2/os2ish.h:964:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char SIS_mec_table[32]; /* Table of RAS Major Event Codes (MECs) */ data/perl-5.32.0/os2/os2ish.h:985:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char SIS_perf_mec_table[32]; /* varga 6/5/97 Table of Performance Major Event Codes (MECS) varga*/ data/perl-5.32.0/os2/os2ish.h:1132:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[1]; data/perl-5.32.0/os2/perlrexx.c:64:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[3] = {"perl_in_REXX", "-e", ""}; data/perl-5.32.0/os2/perlrexx.c:84:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char last_error[4096]; data/perl-5.32.0/os2/perlrexx.c:110:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/perl-5.32.0/os2/perlrexx.c:111:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[3] = {"perl_from_REXX", "-e", buf}; data/perl-5.32.0/os2/perlrexx.c:123:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, rargv[0].strptr, rargv[0].strlength); data/perl-5.32.0/os2/perlrexx.c:191:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retstr->strptr, last_error, len); data/perl-5.32.0/os2/perlrexx.c:194:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(retstr->strptr, "[Not enough memory to copy the errortext]"); data/perl-5.32.0/os2/perlrexx.c:237:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retstr->strptr, str, len); data/perl-5.32.0/pad.h:86:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char xpadn_str[1]; data/perl-5.32.0/parser.h:111:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tokenbuf[256]; data/perl-5.32.0/perl.c:52:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char control[CMSG_SPACE(sizeof(int))]; data/perl-5.32.0/perl.c:348:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[2]="\0"; data/perl-5.32.0/perl.c:473:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer[256]; data/perl-5.32.0/perl.c:739:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char success[sizeof(int) + 1] = {0}; data/perl-5.32.0/perl.c:4076:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpname[sizeof(FAKE_BIT_BUCKET_TEMPLATE)] = { data/perl-5.32.0/perl.c:4268:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[3] = "-x"; data/perl-5.32.0/perl.c:4724:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/perl-5.32.0/perl.c:4778:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sitearch[sizeof(SITEARCH_EXP)+16] = SITEARCH_EXP; data/perl-5.32.0/perl.c:4779:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sitelib[sizeof(SITELIB_EXP)+16] = SITELIB_EXP; data/perl-5.32.0/perl.h:2790:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). # define open open64 data/perl-5.32.0/perl.h:2834:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). # define fopen fopen64 data/perl-5.32.0/perl.h:2849:16: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). # define tmpfile tmpfile64 data/perl-5.32.0/perl.h:3835:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char E[48]; data/perl-5.32.0/perl.h:3836:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char KS[16][48]; data/perl-5.32.0/perl.h:3837:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char block[66]; data/perl-5.32.0/perl.h:3838:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iobuf[16]; data/perl-5.32.0/perl.h:4700:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. EXTCONST char PL_no_mem[sizeof("Out of memory!\n")] data/perl-5.32.0/perl.h:4756:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. EXTCONST char PL_uuemap[65] data/perl-5.32.0/perl.h:4766:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. EXTCONST char PL_uudmap[256] = data/perl-5.32.0/perl.h:4773:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. EXTCONST char PL_bitcount[256] = data/perl-5.32.0/perl.h:4783:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. EXTCONST char PL_uudmap[256]; data/perl-5.32.0/perl.h:4784:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. EXTCONST char PL_bitcount[256]; data/perl-5.32.0/perl.h:4969:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. EXT unsigned char PL_fold_locale[256] = { /* Unfortunately not EXTCONST. */ data/perl-5.32.0/perl.h:5004:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. EXT unsigned char PL_fold_locale[256]; /* Unfortunately not EXTCONST. */ data/perl-5.32.0/perl.h:6920:21: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). # define Atol atol data/perl-5.32.0/perl.h:7008:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __dummy[5]; data/perl-5.32.0/perl_inc_macro.h:113:32: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. # define _INCPUSH_PERL5LIB_ADD char buf[256]; \ data/perl-5.32.0/perlio.c:250:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mode[8]; data/perl-5.32.0/perlio.c:372:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/perl-5.32.0/perlio.c:2237:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8]; data/perl-5.32.0/perlio.c:2433:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PERLIO_TEARDOWN_MESSAGE_BUF_SIZE]; data/perl-5.32.0/perlio.c:2937:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmode[8]; data/perl-5.32.0/perlio.c:2962:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[FILENAME_MAX]; data/perl-5.32.0/perlio.c:3039:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmode[8]; data/perl-5.32.0/perlio.c:3150:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mode[8]; data/perl-5.32.0/perlio.c:3761:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8]; data/perl-5.32.0/perlio.c:5094:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mode[8]; data/perl-5.32.0/perly.c:401:34: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ps->name = (const char *)(yytname[yytoken]); data/perl-5.32.0/perly.c:453:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ps->name = (const char *)(yytname [yyr1[yyn]]); data/perl-5.32.0/pp_ctl.c:722:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_compiled, mg->mg_ptr, mg->mg_len); data/perl-5.32.0/pp_ctl.c:3934:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char slashdot[2] = {'/', '.'}; data/perl-5.32.0/pp_ctl.c:3936:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char backslashdot[2] = {'\\', '.'}; data/perl-5.32.0/pp_ctl.c:4169:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp, dir, dirlen); data/perl-5.32.0/pp_ctl.c:4182:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp, name, len + 1); data/perl-5.32.0/pp_ctl.c:4411:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tbuf[TYPE_DIGITS(long) + 12]; data/perl-5.32.0/pp_pack.c:1744:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hunk[3]; data/perl-5.32.0/pp_pack.c:2892:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[(sizeof(UV)*CHAR_BIT)/7+1]; data/perl-5.32.0/pp_pack.c:2918:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1 + (int)((NV_MAX_10_EXP + 1) / 2)]; /* valid C */ data/perl-5.32.0/pp_pack.c:2921:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1 + (int)((308 + 1) / 2)]; /* valid C */ data/perl-5.32.0/pp_pack.c:3108:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[64]; data/perl-5.32.0/pp_sys.c:169:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char zero_but_true[ZBTLEN + 1] = "0 but true"; data/perl-5.32.0/pp_sys.c:301:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[256]; data/perl-5.32.0/pp_sys.c:1133:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *fd_sets[4]; data/perl-5.32.0/pp_sys.c:1753:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char namebuf[MAXPATHLEN]; data/perl-5.32.0/pp_sys.c:2592:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char namebuf[MAXPATHLEN]; data/perl-5.32.0/pp_sys.c:2957:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[sizeof(s.st_ino)*3+1], *p; data/perl-5.32.0/pp_sys.c:2975:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[sizeof(s.st_ino)*3], *p; data/perl-5.32.0/pp_sys.c:3821:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN]; data/perl-5.32.0/regcomp.c:14763:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[256]; data/perl-5.32.0/regcomp.c:18452:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char literal[3]; data/perl-5.32.0/regcomp.c:21713:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(drx->xpv_cur), &(srx->xpv_cur), data/perl-5.32.0/regcomp.c:22152:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/perl-5.32.0/regcomp.c:22200:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char digits[TYPE_CHARS(long)]; data/perl-5.32.0/regcomp.c:23884:56: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). pos_in_brackets = memCHRs("([<)]>)]>", open); data/perl-5.32.0/regcomp.c:23885:66: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). close = (pos_in_brackets) ? pos_in_brackets[3] : open; data/perl-5.32.0/regcomp.h:126:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1]; data/perl-5.32.0/regcomp.h:134:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1]; data/perl-5.32.0/regcomp.h:142:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1]; data/perl-5.32.0/regcomp.h:200:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bitmap[ANYOF_BITMAP_SIZE]; /* only compile-time */ data/perl-5.32.0/regcomp.h:209:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bitmap[ANYOF_BITMAP_SIZE]; /* both compile-time ... */ data/perl-5.32.0/regcomp.h:227:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bitmap[ANYOF_BITMAP_SIZE]; /* both compile-time ... */ data/perl-5.32.0/regen-configure/dist/lib/C/fake/scandir.C:110:4: [2] (buffer) bcopy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. bcopy((char *) dp, (char *) dp_save, sizeof(Direntry_t)); data/perl-5.32.0/sv.c:1888:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[64]; data/perl-5.32.0/sv.c:1908:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[64]; data/perl-5.32.0/sv.c:2869:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arr[200]; data/perl-5.32.0/sv.c:3112:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retval, typestr, typelen); data/perl-5.32.0/sv.c:3117:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retval, stashname, stashnamelen); data/perl-5.32.0/sv.c:3149:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arr[TYPE_CHARS(UV)]; data/perl-5.32.0/sv.c:9850:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char todo[PERL_UCHAR_MAX+1]; data/perl-5.32.0/sv.c:10742:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arr[TYPE_CHARS(UV)]; data/perl-5.32.0/sv.c:11951:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[IV_DIG * 4 + NV_DIG + 32]; data/perl-5.32.0/sv.c:12054:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char esignbuf[4]; /* holds sign prefix, e.g. "-0x" */ data/perl-5.32.0/sv.c:13657:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char smallbuf[256]; /* XXX MAXPATHLEN, surely? */ data/perl-5.32.0/sv.c:16297:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[2]; data/perl-5.32.0/symbian/PerlBase.h:115:55: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define PerlCopy(s,d,n,t) (MEM_WRAP_CHECK(n,t), (void)memcpy((char*)(d),(char*)(s), (n) * sizeof(t))) data/perl-5.32.0/symbian/PerlBase.h:116:50: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define PerlCopyD(s,d,n,t) (MEM_WRAP_CHECK(n,t), memcpy((char*)(d),(char*)(s), (n) * sizeof(t))) data/perl-5.32.0/symbian/symbian_proto.h:35:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define memcpy _e32memcpy /* GCC intrinsic */ data/perl-5.32.0/symbian/symbian_proto.h:36:15: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. extern void *memcpy(const void *s1, const void *s2, size_t n); data/perl-5.32.0/taint.c:122:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[10 + TYPE_DIGITS(int)] = "DCL$PATH"; data/perl-5.32.0/time64.c:47:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char days_in_month[2][12] = { data/perl-5.32.0/time64.c:322:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, src, sizeof(*dest)); data/perl-5.32.0/toke.c:594:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[UTF8_MAXBYTES + 1]; data/perl-5.32.0/toke.c:1812:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char smallbuf[128]; data/perl-5.32.0/toke.c:1825:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpbuf2 + 2, s, tmplen2); data/perl-5.32.0/toke.c:3944:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hex_string[4]; data/perl-5.32.0/toke.c:3972:33: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hex_string[2 * UTF8_MAXBYTES + 5]; data/perl-5.32.0/toke.c:4342:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char seen[256]; data/perl-5.32.0/toke.c:4345:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[sizeof PL_tokenbuf * 4]; data/perl-5.32.0/toke.c:4469:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[sizeof PL_tokenbuf]; data/perl-5.32.0/toke.c:5101:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[sizeof PL_tokenbuf]; data/perl-5.32.0/toke.c:5138:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[sizeof PL_tokenbuf]; data/perl-5.32.0/toke.c:6091:26: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). char open, close, term; data/perl-5.32.0/toke.c:6107:66: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (*t == '\\' && t+1 < PL_bufend && open != '\\') data/perl-5.32.0/toke.c:6109:44: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). else if (*t == open) data/perl-5.32.0/toke.c:6118:44: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). else if (*t == open) data/perl-5.32.0/toke.c:6883:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[1024]; data/perl-5.32.0/toke.c:8589:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[sizeof PL_tokenbuf + 1]; data/perl-5.32.0/toke.c:9674:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[256]; data/perl-5.32.0/toke.c:10666:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(indent, backup + 1, indent_len); data/perl-5.32.0/toke.c:10814:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(indent, backup, indent_len); data/perl-5.32.0/uconfig.h:909:27: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. #define Gconvert(x,n,t,b) sprintf((b),"%.*g",(n),(x)) data/perl-5.32.0/universal.c:1007:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reflags[sizeof(INT_PAT_MODS) + MAX_CHARSET_NAME_LENGTH]; data/perl-5.32.0/util.c:1090:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. return (char*)memcpy(newaddr, pv, pvlen); data/perl-5.32.0/util.c:1154:19: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. return (char*)memcpy(newaddr, pv, pvlen); data/perl-5.32.0/util.c:1178:19: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. return (char*)memcpy(newaddr, pv, len); data/perl-5.32.0/util.c:2981:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)&pid, spid, len); data/perl-5.32.0/util.c:3108:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, to, size); data/perl-5.32.0/util.c:3114:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, to, (count - items) * len); data/perl-5.32.0/util.c:3163:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[MAXPATHLEN]; data/perl-5.32.0/util.c:3980:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN]; data/perl-5.32.0/util.c:4800:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PERL_MEM_LOG_SPRINTF_BUF_SIZE]; data/perl-5.32.0/util.c:5216:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, *environ, l); data/perl-5.32.0/util.c:5573:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst + used, src, copy); data/perl-5.32.0/util.c:5606:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, copy); data/perl-5.32.0/util.c:5737:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(templte, O_RDWR | O_CREAT | O_EXCL | flags, 0600, "fop=dlt"); data/perl-5.32.0/util.c:6127:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[1024]; data/perl-5.32.0/util.c:6173:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[1024]; data/perl-5.32.0/util.h:257:5: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). int mkstemp(char*); data/perl-5.32.0/util.h:275:37: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). # define Perl_my_mkstemp(templte) mkstemp(templte) data/perl-5.32.0/vms/munchconfig.c:41:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Tag[TOKENBUFFERSIZE]; data/perl-5.32.0/vms/munchconfig.c:42:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Value[512]; data/perl-5.32.0/vms/munchconfig.c:52:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char WorkString[LINEBUFFERSIZE]; data/perl-5.32.0/vms/munchconfig.c:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char LineBuffer[LINEBUFFERSIZE], *TempValue, *StartTilde, *EndTilde; data/perl-5.32.0/vms/munchconfig.c:55:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char SecondaryLineBuffer[LINEBUFFERSIZE], OutBuf[LINEBUFFERSIZE]; data/perl-5.32.0/vms/munchconfig.c:56:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char TokenBuffer[TOKENBUFFERSIZE]; data/perl-5.32.0/vms/munchconfig.c:86:27: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (ConfigSH = fopen(argv[1], "r"))) { data/perl-5.32.0/vms/munchconfig.c:91:27: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (Config_H = fopen(argv[2], "r"))) { data/perl-5.32.0/vms/munchconfig.c:96:46: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (ifile != NULL && NULL == (Extra_Subs = fopen(ifile, "r"))) { data/perl-5.32.0/vms/munchconfig.c:355:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char TempBuffer[LINEBUFFERSIZE], TempTilde[TOKENBUFFERSIZE]; data/perl-5.32.0/vms/vms.c:147:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[VMS_MAXRSS]; data/perl-5.32.0/vms/vms.c:883:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uplnm[LNM$C_NAMLENGTH+1], *cp2; data/perl-5.32.0/vms/vms.c:1073:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uplnm[LNM$C_NAMLENGTH+1], *cp2, *eqv; data/perl-5.32.0/vms/vms.c:1276:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[LNM$C_NAMLENGTH+24], mbxnam[LNM$C_NAMLENGTH], *buf = NULL; data/perl-5.32.0/vms/vms.c:1444:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lnm[LNM$C_NAMLENGTH+1]; data/perl-5.32.0/vms/vms.c:1445:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eqv[MAX_DCL_SYMBOL+1]; data/perl-5.32.0/vms/vms.c:1462:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eqv[LNM$C_NAMLENGTH+1]; data/perl-5.32.0/vms/vms.c:1494:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uplnm[LNM$C_NAMLENGTH], *cp2, *c; data/perl-5.32.0/vms/vms.c:1656:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uplnm[8]; data/perl-5.32.0/vms/vms.c:1727:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char hash[9]; data/perl-5.32.0/vms/vms.c:2099:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newdir, dir1, dirlen-1); data/perl-5.32.0/vms/vms.c:2160:13: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). if ((fp = tmpfile())) return fp; data/perl-5.32.0/vms/vms.c:2166:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cp,"Sys$Scratch:"); data/perl-5.32.0/vms/vms.c:2168:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cp,"/tmp/"); data/perl-5.32.0/vms/vms.c:2170:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(cp,".Perltmp"); data/perl-5.32.0/vms/vms.c:2171:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(cp,"w+","fop=dlt"); data/perl-5.32.0/vms/vms.c:2869:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char csize[LNM$C_NAMLENGTH+1]; data/perl-5.32.0/vms/vms.c:2886:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). mbxbufsiz = atoi(csize); data/perl-5.32.0/vms/vms.c:3250:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mbx1[64], mbx2[64]; data/perl-5.32.0/vms/vms.c:3422:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mbx1[64], mbx2[64]; data/perl-5.32.0/vms/vms.c:3535:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mbx[64]; data/perl-5.32.0/vms/vms.c:3545:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char device[65]; data/perl-5.32.0/vms/vms.c:3652:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dir[NAM$C_MAXRSS+1]; data/perl-5.32.0/vms/vms.c:3680:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[NAM$C_MAXRSS+1]; data/perl-5.32.0/vms/vms.c:3692:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(p->dir,"./"); data/perl-5.32.0/vms/vms.c:3778:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char vmspipe_file[NAM$C_MAXRSS+1]; data/perl-5.32.0/vms/vms.c:3794:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file[NAM$C_MAXRSS+1]; data/perl-5.32.0/vms/vms.c:3824:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file[NAM$C_MAXRSS+1]; data/perl-5.32.0/vms/vms.c:3844:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(file,"sys$scratch:perlpipe_%08.8x_%d.com",mypid,index); data/perl-5.32.0/vms/vms.c:3845:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(file,"w"); data/perl-5.32.0/vms/vms.c:3847:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(file,"sys$login:perlpipe_%08.8x_%d.com",mypid,index); data/perl-5.32.0/vms/vms.c:3848:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(file,"w"); data/perl-5.32.0/vms/vms.c:3850:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(file,"sys$disk:[]perlpipe_%08.8x_%d.com",mypid,index); data/perl-5.32.0/vms/vms.c:3851:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(file,"w"); data/perl-5.32.0/vms/vms.c:3856:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(file,"/tmp/perlpipe_%08.8x_%d.com",mypid,index); data/perl-5.32.0/vms/vms.c:3857:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(file,"w"); data/perl-5.32.0/vms/vms.c:3859:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(file,"/sys$login/perlpipe_%08.8x_%d.com",mypid,index); data/perl-5.32.0/vms/vms.c:3860:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(file,"w"); data/perl-5.32.0/vms/vms.c:3862:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(file,"./perlpipe_%08.8x_%d.com",mypid,index); data/perl-5.32.0/vms/vms.c:3863:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(file,"w"); data/perl-5.32.0/vms/vms.c:3900:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(file,"r","shr=get"); data/perl-5.32.0/vms/vms.c:3987:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char device_name[65]; data/perl-5.32.0/vms/vms.c:3992:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char customization[200]; data/perl-5.32.0/vms/vms.c:3993:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[40]; data/perl-5.32.0/vms/vms.c:3995:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mbx1[64]; data/perl-5.32.0/vms/vms.c:4080:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(title,"Perl Debug DECTerm"); data/perl-5.32.0/vms/vms.c:4191:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *p, mode[10], symbol[MAX_DCL_SYMBOL+1], *vmspipe; data/perl-5.32.0/vms/vms.c:4192:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *in, *out, *err, mbx[512]; data/perl-5.32.0/vms/vms.c:4194:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tfilebuf[NAM$C_MAXRSS+1]; data/perl-5.32.0/vms/vms.c:4196:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd_sym_name[20]; data/perl-5.32.0/vms/vms.c:4485:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cmd_sym_name,"PERL_POPEN_CMD%d",j); data/perl-5.32.0/vms/vms.c:4517:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cmd_sym_name,"PERL_POPEN_CMD%d",j); data/perl-5.32.0/vms/vms.c:4862:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char __gcvtbuf[DBL_DIG+1]; data/perl-5.32.0/vms/vms.c:5921:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char __rmsexpand_retbuf[VMS_MAXRSS]; data/perl-5.32.0/vms/vms.c:6055:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trndir, dir, dirlen); data/perl-5.32.0/vms/vms.c:6242:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, trndir, dirlen); data/perl-5.32.0/vms/vms.c:6248:11: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf,".dir"); data/perl-5.32.0/vms/vms.c:6250:11: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf,".DIR"); data/perl-5.32.0/vms/vms.c:6252:11: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf,";1"); data/perl-5.32.0/vms/vms.c:6448:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, my_esa, dirlen); data/perl-5.32.0/vms/vms.c:6501:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf,".DIR;1"); data/perl-5.32.0/vms/vms.c:6520:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char __fileify_retbuf[VMS_MAXRSS]; data/perl-5.32.0/vms/vms.c:6600:14: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, dir, len); data/perl-5.32.0/vms/vms.c:6603:14: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf[len], n_spec, n_len); data/perl-5.32.0/vms/vms.c:6618:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, dir, len); data/perl-5.32.0/vms/vms.c:6621:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf[len], n_spec, n_len); data/perl-5.32.0/vms/vms.c:6639:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf[len], e_spec, e_len); data/perl-5.32.0/vms/vms.c:6721:13: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf, ":[000000]"); data/perl-5.32.0/vms/vms.c:6774:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf[2], n_spec, n_len); data/perl-5.32.0/vms/vms.c:6964:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char __pathify_retbuf[VMS_MAXRSS]; data/perl-5.32.0/vms/vms.c:7164:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(rslt, "/dev/null"); data/perl-5.32.0/vms/vms.c:7183:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(rslt, "/tmp"); data/perl-5.32.0/vms/vms.c:7394:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char __tounixspec_retbuf[VMS_MAXRSS]; data/perl-5.32.0/vms/vms.c:7512:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(vmspath,"SYS$POSIX_ROOT:"); data/perl-5.32.0/vms/vms.c:7682:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(vmspath, "_NLA0:"); data/perl-5.32.0/vms/vms.c:7807:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(esa, unixptr, seg_len); data/perl-5.32.0/vms/vms.c:7870:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vmsptr, v_spec, v_len); data/perl-5.32.0/vms/vms.c:7892:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vmsptr, r_spec, r_len); data/perl-5.32.0/vms/vms.c:7922:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vmsptr, d_spec, d_len); data/perl-5.32.0/vms/vms.c:8048:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(vmspath, "SYS$DISK:["); data/perl-5.32.0/vms/vms.c:8437:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(rslt,"[]"); data/perl-5.32.0/vms/vms.c:8444:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(rslt,"[-]"); data/perl-5.32.0/vms/vms.c:8556:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(rslt,"sys$disk:[000000]"); data/perl-5.32.0/vms/vms.c:8559:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(rslt,"sys$posix_root:[000000]"); data/perl-5.32.0/vms/vms.c:8577:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(rslt,"sys$system"); data/perl-5.32.0/vms/vms.c:8583:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(rslt,"sys$scratch"); data/perl-5.32.0/vms/vms.c:8589:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(rslt, "sys$posix_root"); data/perl-5.32.0/vms/vms.c:8599:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(rslt,"NLA0"); data/perl-5.32.0/vms/vms.c:8872:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char __tovmsspec_retbuf[VMS_MAXRSS]; data/perl-5.32.0/vms/vms.c:8957:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char __tovmspath_retbuf[VMS_MAXRSS]; data/perl-5.32.0/vms/vms.c:8984:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp,vmsified,vmslen); data/perl-5.32.0/vms/vms.c:9027:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char __tounixpath_retbuf[VMS_MAXRSS]; data/perl-5.32.0/vms/vms.c:9055:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp,unixified,unixlen); data/perl-5.32.0/vms/vms.c:9315:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mbxname[L_tmpnam]; data/perl-5.32.0/vms/vms.c:9360:24: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (tmperr = fopen(err, errmode, "mbc=32", "mbf=2"))) data/perl-5.32.0/vms/vms.c:9532:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char subcmd[2*MAX_DCL_LINE_LENGTH], *p, *q; data/perl-5.32.0/vms/vms.c:9581:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[MAX_DCL_SYMBOL + 1] = "$"; data/perl-5.32.0/vms/vms.c:9586:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pidstring[80]; data/perl-5.32.0/vms/vms.c:9612:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(pidstring, "%08X", pid); data/perl-5.32.0/vms/vms.c:9639:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eqv[LNM$C_NAMLENGTH+1] = ""; data/perl-5.32.0/vms/vms.c:9741:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(newargv[1], "-T"); data/perl-5.32.0/vms/vms.c:10007:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char def[NAM$C_MAXRSS+1], *st; data/perl-5.32.0/vms/vms.c:10213:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). e->vms_versions[e->vms_verscount] = atoi(p + 1); data/perl-5.32.0/vms/vms.c:10323:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dd->entry.d_name, n_spec, n_len + e_len); data/perl-5.32.0/vms/vms.c:10333:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char new_name[256]; data/perl-5.32.0/vms/vms.c:10458:10: [2] (race) vfork: On some old systems, vfork() permits race conditions, and it's very difficult to use correctly (CWE-362). Use fork() instead. return vfork(); data/perl-5.32.0/vms/vms.c:10525:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char image_name[NAM$C_MAXRSS+1]; data/perl-5.32.0/vms/vms.c:10526:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char image_argv[NAM$C_MAXRSS+1]; data/perl-5.32.0/vms/vms.c:10643:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(r, resspec, cp2 - resspec); data/perl-5.32.0/vms/vms.c:10724:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(resspec,"r","ctx=bin","ctx=rec","shr=get"); data/perl-5.32.0/vms/vms.c:10726:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b[256] = {0,0,0,0}; data/perl-5.32.0/vms/vms.c:10754:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpspec[NAM$C_MAXRSS + 1]; data/perl-5.32.0/vms/vms.c:10904:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char equiv[LNM$C_NAMLENGTH]; data/perl-5.32.0/vms/vms.c:11103:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mode[3]; data/perl-5.32.0/vms/vms.c:11108:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(mode, "nW"); data/perl-5.32.0/vms/vms.c:11202:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( data, src, itmsz*nitm ); data/perl-5.32.0/vms/vms.c:11329:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char __pw_namecache[UAI$S_IDENT+1]; data/perl-5.32.0/vms/vms.c:11339:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pw_gecos[UAI$S_OWNER+1]; data/perl-5.32.0/vms/vms.c:11344:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pw_dir[UAI$S_DEFDEV+UAI$S_DEFDIR+1]; data/perl-5.32.0/vms/vms.c:11348:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char unixdir[UAI$_DEFDEV+UAI$S_DEFDIR+1]; data/perl-5.32.0/vms/vms.c:11352:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pw_shell[UAI$S_DEFCLI+1]; data/perl-5.32.0/vms/vms.c:11354:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char pw_passwd[UAI$S_PWD+1]; data/perl-5.32.0/vms/vms.c:11386:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&defdev.pw_dir[ldefdev], &defdir.unixdir[0], ldefdir); data/perl-5.32.0/vms/vms.c:11602:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char off[LNM$C_NAMLENGTH+1];; data/perl-5.32.0/vms/vms.c:11610:32: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). else { utc_offset_secs = atol(off); } data/perl-5.32.0/vms/vms.c:11856:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char usrname[L_cuserid]; data/perl-5.32.0/vms/vms.c:12885:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ultimate_name[NAM$C_MAXRSS+1], work_name[NAM$C_MAXRSS*8 + 1], data/perl-5.32.0/vms/vms.c:12895:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ultimate_name, "PL_"); data/perl-5.32.0/vms/vms.c:13354:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst,src,sizeof(struct interp_intern)); data/perl-5.32.0/vms/vms.c:13696:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dir_name, filespec, dir_len); data/perl-5.32.0/vms/vms.c:13708:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dir_name, filespec, dir_len); data/perl-5.32.0/vms/vms.c:13842:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char val_str[10]; data/perl-5.32.0/vms/vms.c:13890:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char val_str[LNM$C_NAMLENGTH+1]; data/perl-5.32.0/vms/vmsish.h:208:10: [2] (race) vfork: On some old systems, vfork() permits race conditions, and it's very difficult to use correctly (CWE-362). Use fork() instead. # ifdef vfork data/perl-5.32.0/vms/vmsish.h:209:12: [2] (race) vfork: On some old systems, vfork() permits race conditions, and it's very difficult to use correctly (CWE-362). Use fork() instead. # undef vfork data/perl-5.32.0/vms/vmsish.h:211:11: [2] (race) vfork: On some old systems, vfork() permits race conditions, and it's very difficult to use correctly (CWE-362). Use fork() instead. # define vfork my_vfork data/perl-5.32.0/vms/vmsish.h:220:11: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). # define tmpfile Perl_my_tmpfile data/perl-5.32.0/vms/vmsish.h:523:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char d_name[256]; /* File name */ data/perl-5.32.0/vms/vmsish.h:603:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char st_devnam[256]; /* Cache the (short) VMS name */ data/perl-5.32.0/vms/vmsish.h:625:34: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define VMS_INO_T_COPY(__a, __b) memcpy(&__a, &__b, 6) data/perl-5.32.0/vos/vos.c:29:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open(path,O_WRONLY); data/perl-5.32.0/vutil.c:593:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tbuf[64]; data/perl-5.32.0/vutil.c:616:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tbuf[64]; data/perl-5.32.0/win32/fcrypt.c:13:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef unsigned char des_cblock[8]; data/perl-5.32.0/win32/fcrypt.c:328:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char shifts2[16]={0,0,1,1,1,1,1,1,0,1,1,1,1,1,1,0}; data/perl-5.32.0/win32/fcrypt.c:438:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned const char con_salt[128]={ data/perl-5.32.0/win32/fcrypt.c:457:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned const char cov_2char[64]={ data/perl-5.32.0/win32/fcrypt.c:484:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char bb[9]; data/perl-5.32.0/win32/include/dirent.h:29:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char d_name[257]; /* file name */ data/perl-5.32.0/win32/perlglob.c:33:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char root[MAX_PATH]; data/perl-5.32.0/win32/perlglob.c:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char volname[MAX_PATH]; data/perl-5.32.0/win32/perlhost.h:831:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mode[3]; data/perl-5.32.0/win32/perlhost.h:971:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&u_long_arg, data, sizeof u_long_arg); data/perl-5.32.0/win32/perlhost.h:973:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data, &u_long_arg, sizeof u_long_arg); data/perl-5.32.0/win32/perlhost.h:1951:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlMem, &perlMem, sizeof(perlMem)); data/perl-5.32.0/win32/perlhost.h:1952:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlMemShared, &perlMemShared, sizeof(perlMemShared)); data/perl-5.32.0/win32/perlhost.h:1953:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlMemParse, &perlMemParse, sizeof(perlMemParse)); data/perl-5.32.0/win32/perlhost.h:1954:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlEnv, &perlEnv, sizeof(perlEnv)); data/perl-5.32.0/win32/perlhost.h:1955:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlStdIO, &perlStdIO, sizeof(perlStdIO)); data/perl-5.32.0/win32/perlhost.h:1956:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlLIO, &perlLIO, sizeof(perlLIO)); data/perl-5.32.0/win32/perlhost.h:1957:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlDir, &perlDir, sizeof(perlDir)); data/perl-5.32.0/win32/perlhost.h:1958:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlSock, &perlSock, sizeof(perlSock)); data/perl-5.32.0/win32/perlhost.h:1959:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlProc, &perlProc, sizeof(perlProc)); data/perl-5.32.0/win32/perlhost.h:2001:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlMem, &perlMem, sizeof(perlMem)); data/perl-5.32.0/win32/perlhost.h:2002:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlMemShared, &perlMemShared, sizeof(perlMemShared)); data/perl-5.32.0/win32/perlhost.h:2003:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlMemParse, &perlMemParse, sizeof(perlMemParse)); data/perl-5.32.0/win32/perlhost.h:2004:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlEnv, &perlEnv, sizeof(perlEnv)); data/perl-5.32.0/win32/perlhost.h:2005:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlStdIO, &perlStdIO, sizeof(perlStdIO)); data/perl-5.32.0/win32/perlhost.h:2006:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlLIO, &perlLIO, sizeof(perlLIO)); data/perl-5.32.0/win32/perlhost.h:2007:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlDir, &perlDir, sizeof(perlDir)); data/perl-5.32.0/win32/perlhost.h:2008:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlSock, &perlSock, sizeof(perlSock)); data/perl-5.32.0/win32/perlhost.h:2009:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlProc, &perlProc, sizeof(perlProc)); data/perl-5.32.0/win32/perlhost.h:2035:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlMem, &perlMem, sizeof(perlMem)); data/perl-5.32.0/win32/perlhost.h:2036:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlMemShared, &perlMemShared, sizeof(perlMemShared)); data/perl-5.32.0/win32/perlhost.h:2037:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlMemParse, &perlMemParse, sizeof(perlMemParse)); data/perl-5.32.0/win32/perlhost.h:2038:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlEnv, &perlEnv, sizeof(perlEnv)); data/perl-5.32.0/win32/perlhost.h:2039:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlStdIO, &perlStdIO, sizeof(perlStdIO)); data/perl-5.32.0/win32/perlhost.h:2040:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlLIO, &perlLIO, sizeof(perlLIO)); data/perl-5.32.0/win32/perlhost.h:2041:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlDir, &perlDir, sizeof(perlDir)); data/perl-5.32.0/win32/perlhost.h:2042:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlSock, &perlSock, sizeof(perlSock)); data/perl-5.32.0/win32/perlhost.h:2043:5: [2] (buffer) CopyMemory: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. CopyMemory(&m_hostperlProc, &perlProc, sizeof(perlProc)); data/perl-5.32.0/win32/vdir.h:121:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *dirTableA[driveCount]; data/perl-5.32.0/win32/vdir.h:122:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szLocalBufferA[MAX_PATH+1]; data/perl-5.32.0/win32/vdir.h:186:6: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). MultiByteToWideChar(CP_ACP, 0, dirTableA[index], -1, data/perl-5.32.0/win32/vdir.h:231:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szBuffer[MAX_PATH+1]; data/perl-5.32.0/win32/vdir.h:390:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szBuffer[(MAX_PATH+1)*2]; data/perl-5.32.0/win32/vdir.h:391:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szlBuf[MAX_PATH+1]; data/perl-5.32.0/win32/vdir.h:475:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szBuffer[(MAX_PATH+1)*2]; data/perl-5.32.0/win32/vmem.h:41:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szBuffer[512]; data/perl-5.32.0/win32/vmem.h:472:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char m_FreeDummy[minAllocSize]; // dummy free block data/perl-5.32.0/win32/vmem.h:1173:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szBuffer[512]; data/perl-5.32.0/win32/vmem.h:1176:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). m_pLog = fopen(LOG_FILENAME, "w"); data/perl-5.32.0/win32/win32.c:168:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char w32_module_name[MAX_PATH+1]; data/perl-5.32.0/win32/win32.c:323:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char base[10]; data/perl-5.32.0/win32/win32.c:325:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mod_name[MAX_PATH+1]; data/perl-5.32.0/win32/win32.c:334:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(base, "%d.%d", (int)PERL_REVISION, (int)PERL_VERSION); data/perl-5.32.0/win32/win32.c:392:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_PATH+1]; data/perl-5.32.0/win32/win32.c:409:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char regstr[40]; data/perl-5.32.0/win32/win32.c:411:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathstr[MAX_PATH+1]; data/perl-5.32.0/win32/win32.c:836:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char scanname[MAX_PATH+3]; data/perl-5.32.0/win32/win32.c:839:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_PATH*2]; data/perl-5.32.0/win32/win32.c:870:5: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). MultiByteToWideChar(CP_ACP, 0, scanname, -1, wscanname, sizeof(wscanname)/sizeof(WCHAR)); data/perl-5.32.0/win32/win32.c:943:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_PATH*2]; data/perl-5.32.0/win32/win32.c:1063:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dup, dirp, sizeof(DIR)); data/perl-5.32.0/win32/win32.c:1066:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dup->start, dirp->start, dirp->size); data/perl-5.32.0/win32/win32.c:1148:5: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). int mkstemp(const char *path) data/perl-5.32.0/win32/win32.c:1151:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_PATH+1]; data/perl-5.32.0/win32/win32.c:1461:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_PATH+1]; data/perl-5.32.0/win32/win32.c:1602:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[MAX_PATH+1]; data/perl-5.32.0/win32/win32.c:2068:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(name->sysname, "Windows"); data/perl-5.32.0/win32/win32.c:2071:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(name->sysname, "Windows NT"); data/perl-5.32.0/win32/win32.c:2074:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(name->sysname, "Win32s"); data/perl-5.32.0/win32/win32.c:2077:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(name->sysname, "Win32 Unknown"); data/perl-5.32.0/win32/win32.c:2082:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name->release, "%d.%d", data/perl-5.32.0/win32/win32.c:2086:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name->version, "Build %d", data/perl-5.32.0/win32/win32.c:2134:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name->machine, "unknown(0x%x)", procarch); data/perl-5.32.0/win32/win32.c:2672:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(w32_strerror_buffer, "Unknown Error"); data/perl-5.32.0/win32/win32.c:2702:14: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. dwLen = sprintf(sMsg, data/perl-5.32.0/win32/win32.c:2770:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(PerlDir_mapA(filename), mode); data/perl-5.32.0/win32/win32.c:2921:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prefix[MAX_PATH+1]; data/perl-5.32.0/win32/win32.c:2922:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_PATH+1]; data/perl-5.32.0/win32/win32.c:3161:9: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). if (MultiByteToWideChar(CP_ACP, 0, oldname, -1, wOldName, MAX_PATH+1) && data/perl-5.32.0/win32/win32.c:3162:9: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). MultiByteToWideChar(CP_ACP, 0, newname, -1, wNewName, MAX_PATH+1) && data/perl-5.32.0/win32/win32.c:3211:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szOldName[MAX_PATH+1]; data/perl-5.32.0/win32/win32.c:3274:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b[4096]; data/perl-5.32.0/win32/win32.c:3338:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return open(PerlDir_mapA(path), flag, pmode); data/perl-5.32.0/win32/win32.c:3741:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szfilename[MAX_PATH+1]; data/perl-5.32.0/win32/win32.c:4183:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mode[3]; data/perl-5.32.0/win32/win32.c:4218:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_PATH+1]; data/perl-5.32.0/win32/win32.c:4447:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ansi_path+len+1, ansi_dir, ansi_len+1); data/perl-5.32.0/win32/win32.c:4455:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ansi_path, "PATH=", 5); data/perl-5.32.0/win32/win32.c:4456:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ansi_path+5, ansi_dir, len+1); data/perl-5.32.0/win32/win32.h:198:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sysname[SYS_NMLN]; data/perl-5.32.0/win32/win32.h:199:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodename[SYS_NMLN]; data/perl-5.32.0/win32/win32.h:200:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char release[SYS_NMLN]; data/perl-5.32.0/win32/win32.h:201:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[SYS_NMLN]; data/perl-5.32.0/win32/win32.h:202:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char machine[SYS_NMLN]; data/perl-5.32.0/win32/win32.h:427:13: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). extern int mkstemp(const char *path); data/perl-5.32.0/win32/win32.h:521:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Wstrerror_buffer[512]; data/perl-5.32.0/win32/win32.h:523:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Wgetlogin_buffer[128]; data/perl-5.32.0/win32/win32.h:525:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Wcrypt_buffer[30]; data/perl-5.32.0/win32/win32.h:546:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sigterm[MAXIMUM_WAIT_OBJECTS]; data/perl-5.32.0/win32/win32.h:667:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pipech2[2]; /* 2 more peak ahead chars for UNICODE mode */ data/perl-5.32.0/win32/win32io.c:331:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mode[8]; data/perl-5.32.0/win32/win32iop.h:216:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define fopen win32_fopen data/perl-5.32.0/win32/win32iop.h:234:9: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). #define tmpfile() win32_tmpfile() data/perl-5.32.0/win32/win32iop.h:253:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define open win32_open data/perl-5.32.0/win32/win32sck.c:620:59: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((s = PerlEnv_getenv("PERL_ALLOW_NON_IFS_LSP")) && atoi(s)) data/perl-5.32.0/win32/win32sck.c:848:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&u_long_arg, data, sizeof u_long_arg); data/perl-5.32.0/win32/win32sck.c:850:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data, &u_long_arg, sizeof u_long_arg); data/perl-5.32.0/NetWare/NWUtil.c:127:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffer = (char *) malloc((strlen(commandLine) + 1) * sizeof(char)); data/perl-5.32.0/NetWare/NWUtil.c:181:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant character. strncpy(pclp->sSkippedToken, "", (MAX_DN_BYTES * sizeof(char))); data/perl-5.32.0/NetWare/NWUtil.c:486:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant character. strncpy(pclp->m_argv[i], "", (MAX_DN_BYTES * sizeof(char))); // MAX_DN_BYTES is the size of pclp->m_argv[]. data/perl-5.32.0/NetWare/NWUtil.c:490:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((new_arg==NULL) || ((strlen(new_arg))<=0)) data/perl-5.32.0/NetWare/NWUtil.c:659:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(buffer, ""); data/perl-5.32.0/NetWare/NWUtil.c:663:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buffer, s, length); data/perl-5.32.0/NetWare/NWUtil.c:748:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). numbuf[strlen(numbuf)-1] = '\0'; data/perl-5.32.0/NetWare/NWUtil.c:753:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(numbuf) > 5) data/perl-5.32.0/NetWare/NWUtil.c:754:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pPid = &numbuf[strlen(numbuf)-5]; data/perl-5.32.0/NetWare/NWUtil.c:837:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). totalSize += strlen(argv[k]) + 1; data/perl-5.32.0/NetWare/Nwmain.c:367:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strnicmp(cptr, PERL_COMMAND_NAME, strlen(PERL_COMMAND_NAME)) == 0) && data/perl-5.32.0/NetWare/Nwmain.c:368:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ((cptr[strlen(PERL_COMMAND_NAME)] == ' ') || data/perl-5.32.0/NetWare/Nwmain.c:369:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (cptr[strlen(PERL_COMMAND_NAME)] == '\t') || data/perl-5.32.0/NetWare/Nwmain.c:370:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (cptr[strlen(PERL_COMMAND_NAME)] == '\0'))) data/perl-5.32.0/NetWare/Nwpipe.c:189:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant character. strncpy(ptpf->m_fileName, "", (_MAX_PATH * sizeof(char))); data/perl-5.32.0/NetWare/Nwpipe.c:334:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant character. strncpy(ptpf->m_redirect, "", (MAX_DN_BYTES * sizeof(char))); data/perl-5.32.0/NetWare/Nwpipe.c:347:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy ( tempName, fnNwGetEnvironmentStr((char *)"TEMP", NWDEFPERLTEMP), (_MAX_PATH - 20) ); data/perl-5.32.0/NetWare/intdef.h:45:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define strlen NWLmbslen data/perl-5.32.0/NetWare/intdef.h:52:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). #define strncpy(x,y,z) NWLstrbcpy(x,y,(z + 1)) data/perl-5.32.0/NetWare/intdef.h:60:9: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. #define strncat(x,y,l) \ data/perl-5.32.0/NetWare/intdef.h:62:4: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(x,y,l); data/perl-5.32.0/NetWare/nw5.c:510:13: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return getc(pf); data/perl-5.32.0/NetWare/nw5.c:528:13: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return fgetc(pf); data/perl-5.32.0/NetWare/nw5.c:576:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(filename); data/perl-5.32.0/NetWare/nw5.c:753:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return read(fd, buf, cnt); data/perl-5.32.0/NetWare/nw5.c:984:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Newx(argv, strlen(cmd) / 2 + 2, char*); data/perl-5.32.0/NetWare/nw5.c:985:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Newx(cmd2, strlen(cmd) + 1, char); data/perl-5.32.0/NetWare/nwperlhost.h:113:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *len = strlen(e); data/perl-5.32.0/NetWare/nwperlhost.h:883:12: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). return umask(pmode); data/perl-5.32.0/NetWare/nwperlsys.h:251:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *len = strlen(e); data/perl-5.32.0/NetWare/nwperlsys.h:773:12: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). return umask(pmode); data/perl-5.32.0/NetWare/testnlm/type/type.c:28:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!defaultDir || (strlen(defaultDir) == 0)) data/perl-5.32.0/NetWare/testnlm/type/type.c:39:25: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((thechar = getc(pfile)) != EOF) data/perl-5.32.0/XSUB.h:508:12: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). # undef getc data/perl-5.32.0/XSUB.h:569:13: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). # define getc PerlSIO_getc data/perl-5.32.0/XSUB.h:606:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). # define read PerlLIO_read data/perl-5.32.0/XSUB.h:611:13: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). # define umask PerlLIO_umask data/perl-5.32.0/amigaos4/amigaio.c:654:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const Size_t cmdlen = strlen(incmd) + 1; data/perl-5.32.0/amigaos4/amigaio.c:882:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (p = string; p < string + strlen(string); p++) data/perl-5.32.0/amigaos4/amigaio.c:904:8: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #undef fgetc data/perl-5.32.0/amigaos4/amigaio.c:949:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(*cur) + 1 + data/perl-5.32.0/amigaos4/amigaio.c:957:7: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (fgetc(fh) == '#' && fgetc(fh) == '!') data/perl-5.32.0/amigaos4/amigaio.c:957:27: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (fgetc(fh) == '#' && fgetc(fh) == '!') data/perl-5.32.0/amigaos4/amigaio.c:965:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (buffer[strlen(buffer) - 1] == '\n') data/perl-5.32.0/amigaos4/amigaio.c:966:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffer[strlen(buffer) - 1] = '\0'; data/perl-5.32.0/amigaos4/amigaio.c:979:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size += strlen(interpreter) + 1; data/perl-5.32.0/amigaos4/amigaio.c:980:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size += strlen(interpreter_args) + 1; data/perl-5.32.0/amigaos4/amigaio.c:999:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size += strlen(filename_conv); data/perl-5.32.0/amigaos4/amigaio.c:1030:4: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf(full, ""); data/perl-5.32.0/amigaos4/amigaio.c:1046:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(*cur) + 4 + esc, data/perl-5.32.0/amigaos4/amigaio.c:1084:6: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(full, "\""); data/perl-5.32.0/amigaos4/amigaio.c:1092:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(full, " "); data/perl-5.32.0/amigaos4/amigaio.c:1095:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(full, "\n"); data/perl-5.32.0/amigaos4/amigaos.c:155:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = strlen(s) + 1; data/perl-5.32.0/amigaos4/amigaos.c:282:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((len = strlen(*envp))) data/perl-5.32.0/amigaos4/amigaos.c:296:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(val) + 1, data/perl-5.32.0/amigaos4/amigaos.c:338:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(filename) + 1; data/perl-5.32.0/amigaos4/amigaos.c:339:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name = (char *)IExec->AllocVecTags(strlen(path) + len, AVT_ClearWithValue,0,AVT_Type,MEMF_SHARED,TAG_DONE); data/perl-5.32.0/amigaos4/amigaos.c:340:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pathpart = (char *)IExec->AllocVecTags(strlen(path) + 1, AVT_ClearWithValue,0,AVT_Type,MEMF_SHARED,TAG_DONE); data/perl-5.32.0/amigaos4/amigaos.c:353:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strlen(pathpart) == 0)) data/perl-5.32.0/amigaos4/amigaos.c:422:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(message->sv_GDir) <= 4) data/perl-5.32.0/amigaos4/amigaos.c:431:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(message->sv_GDir) <= 4) data/perl-5.32.0/amigaos4/amigaos.c:435:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(message->sv_Name) + 1 + message->sv_VarLen + 1 + 1; data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/bzlib.c:915:14: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). Int32 c = fgetc ( f ); data/perl-5.32.0/cpan/Compress-Raw-Bzip2/bzip2-src/bzlib.c:1425:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(mode2,"b"); /* binary mode */ data/perl-5.32.0/cpan/Digest-SHA/src/sdf.c:96:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (stash && isa_lookup(stash, name, strlen(name), 0) == &sv_yes) data/perl-5.32.0/cpan/Win32API-File/buffers.h:415:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SvCUR_set( svBuf, strlen(sBuf) ); \ data/perl-5.32.0/cpan/Win32API-File/buffers.h:422:24: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SvCUR_set( svBuf, wcslen(sBuf)*sizeof(WCHAR) ); \ data/perl-5.32.0/cpan/Win32API-File/const2perl.h:56:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Size_t lLen= 1+2*strlen(sValue); data/perl-5.32.0/cpan/Win32API-File/const2perl.h:92:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *sVarName= (char *) malloc( 15+strlen(sModName) ); data/perl-5.32.0/cpan/Win32API-File/const2perl.h:153:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { char *sVarName= malloc( 15+strlen(sModName) ); \ data/perl-5.32.0/cygwin/cygwin.c:195:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int wlen = sizeof(wchar_t)*strlen(buf); data/perl-5.32.0/cygwin/cygwin.c:477:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). av_push(av, newSVpvn(mnt->mnt_dir, strlen(mnt->mnt_dir))); data/perl-5.32.0/cygwin/cygwin.c:478:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). av_push(av, newSVpvn(mnt->mnt_fsname, strlen(mnt->mnt_fsname))); data/perl-5.32.0/cygwin/cygwin.c:479:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). av_push(av, newSVpvn(mnt->mnt_type, strlen(mnt->mnt_type))); data/perl-5.32.0/cygwin/cygwin.c:480:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). av_push(av, newSVpvn(mnt->mnt_opts, strlen(mnt->mnt_opts))); data/perl-5.32.0/cygwin/cygwin.c:508:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(user) > 0) { data/perl-5.32.0/cygwin/cygwin.c:524:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(mnt->mnt_opts) > 0) { data/perl-5.32.0/cygwin/cygwin.c:525:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(flags, ","); data/perl-5.32.0/cygwin/cygwin.c:546:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(user) > 0) { data/perl-5.32.0/djgpp/djgpp.c:44:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (md[0] == 'w' && (l1->command = malloc (1 + strlen (cm)))) data/perl-5.32.0/djgpp/djgpp.c:284:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pattern=alloca (strlen (name+=13)+1); data/perl-5.32.0/djgpp/djgpp.c:300:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len+=1+strlen (pglob.gl_pathv[ic]); data/perl-5.32.0/djgpp/djgpp.c:308:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p1+=strlen (p1)+1; data/perl-5.32.0/djgpp/djgpp.c:315:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gi->size=strlen (name)+1; data/perl-5.32.0/doio.c:1132:23: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). int old_umask = umask(0177); data/perl-5.32.0/doio.c:1134:7: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(old_umask); data/perl-5.32.0/doio.c:2357:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const Size_t cmdlen = strlen(incmd) + 1; data/perl-5.32.0/dump.c:1299:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). generic_pv_escape(label, cPVOPo->op_pv, strlen(cPVOPo->op_pv), 0); data/perl-5.32.0/ext/SDBM_File/dba.c:24:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name = (char *) malloc((n = strlen(p)) + 5); data/perl-5.32.0/ext/SDBM_File/dba.c:52:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((b = read(pagf, pag, PBLKSIZ)) > 0) { data/perl-5.32.0/ext/SDBM_File/dbd.c:27:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name = (char *) malloc((n = strlen(p)) + 5); data/perl-5.32.0/ext/SDBM_File/dbd.c:52:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((r = read(pagf, pag, PBLKSIZ)) > 0) { data/perl-5.32.0/ext/SDBM_File/dbe.c:154:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). db.dptr = (char *) malloc(strlen(s) * sizeof(char)); data/perl-5.32.0/ext/SDBM_File/dbu.c:117:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(line) - 1; data/perl-5.32.0/ext/SDBM_File/dbu.c:135:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(line) - 1; data/perl-5.32.0/ext/SDBM_File/dbu.c:159:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(line) - 1; data/perl-5.32.0/ext/SDBM_File/sdbm.c:91:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filelen = strlen(file); data/perl-5.32.0/ext/SDBM_File/sdbm.c:398:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). || read(db->pagf, db->pagbuf, PBLKSIZ) < 0) data/perl-5.32.0/ext/SDBM_File/sdbm.c:452:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). || read(db->pagf, db->pagbuf, PBLKSIZ) < 0) data/perl-5.32.0/ext/SDBM_File/sdbm.c:479:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). || (got=read(db->dirf, db->dirbuf, DBLKSIZ)) < 0) data/perl-5.32.0/ext/SDBM_File/sdbm.c:503:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). || (got=read(db->dirf, db->dirbuf, DBLKSIZ)) < 0) data/perl-5.32.0/ext/SDBM_File/sdbm.c:553:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(db->pagf, db->pagbuf, PBLKSIZ) <= 0) data/perl-5.32.0/fakesdio.h:23:8: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #undef fgetc data/perl-5.32.0/fakesdio.h:41:8: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #undef getc data/perl-5.32.0/fakesdio.h:78:9: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define fgetc(f) PerlIO_getc(f) data/perl-5.32.0/fakesdio.h:81:9: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define getc(f) PerlIO_getc(f) data/perl-5.32.0/gv.c:97:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return gv_fetchfile_flags(name, strlen(name), 0); data/perl-5.32.0/gv.c:189:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(file); data/perl-5.32.0/gv.c:363:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gv_init_pvn(gv, stash, name, strlen(name), flags); data/perl-5.32.0/gv.c:673:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return gv_fetchmeth_internal(stash, NULL, name, strlen(name), level, flags); data/perl-5.32.0/gv.c:941:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return gv_fetchmeth_pvn_autoload(stash, name, strlen(name), level, flags); data/perl-5.32.0/gv.c:1043:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return gv_fetchmethod_pvn_flags(stash, name, strlen(name), flags); data/perl-5.32.0/gv.c:1214:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return gv_autoload_pvn(stash, namepv, strlen(namepv), flags); data/perl-5.32.0/gv.c:1439:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return gv_stashpvn(name, strlen(name), create); data/perl-5.32.0/gv.c:1613:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return gv_fetchpvn_flags(nambeg, strlen(nambeg), add, sv_type); data/perl-5.32.0/gv.c:2048:59: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SV * const * const init = hv_fetch(hv, PL_sig_name[i], strlen(PL_sig_name[i]), 1); data/perl-5.32.0/gv.c:2610:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). UTF8fARG(flags, strlen(pack), pack), data/perl-5.32.0/hv.c:3465:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return refcounted_he_fetch_pvn(chain, key, strlen(key), hash, flags); data/perl-5.32.0/hv.c:3653:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return refcounted_he_new_pvn(parent, key, strlen(key), hash, value, flags); data/perl-5.32.0/inline.h:420:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen((const char *)s); data/perl-5.32.0/inline.h:901:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen((const char *)s); data/perl-5.32.0/inline.h:973:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen((const char *) s); data/perl-5.32.0/inline.h:1250:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen((const char *) s); data/perl-5.32.0/inline.h:1327:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen((const char *) s); data/perl-5.32.0/inline.h:1411:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen((const char *) s); data/perl-5.32.0/inline.h:1938:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(pv); data/perl-5.32.0/iperlsys.h:301:28: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define PerlSIO_fgetc(f) fgetc(f) data/perl-5.32.0/iperlsys.h:777:38: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define PerlLIO_read(fd, buf, count) read((fd), (buf), (count)) data/perl-5.32.0/iperlsys.h:781:30: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). #define PerlLIO_umask(mode) umask((mode)) data/perl-5.32.0/locale.c:699:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). names_len += strlen(category_names[i]) data/perl-5.32.0/locale.c:701:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(PL_curlocales[i]) data/perl-5.32.0/locale.c:873:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char * e = locale + strlen(locale); data/perl-5.32.0/locale.c:2447:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). string_size = strlen(string) + offset + 1; data/perl-5.32.0/locale.c:3132:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Size_t format_size = strlen(format) + 1; data/perl-5.32.0/locale.c:3935:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). STRLEN s_strlen = strlen(input_string); data/perl-5.32.0/locale.c:4093:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s_strlen = strlen(s); data/perl-5.32.0/locale.c:4101:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(s); data/perl-5.32.0/locale.c:4657:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). input_name_len = strlen(save_input_locale); data/perl-5.32.0/locale.c:5022:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const Size_t final_pos = strlen(save_input_locale) - 1; data/perl-5.32.0/locale.c:5100:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Size_t utf8ness_cache_len = strlen(utf8ness_cache); data/perl-5.32.0/locale.c:5120:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). utf8ness_cache_len = strlen(utf8ness_cache); data/perl-5.32.0/locale.c:5132:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((PL_locale_utf8ness[strlen(PL_locale_utf8ness)-1] & ~1) != '0') { data/perl-5.32.0/locale.c:5137:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). PL_locale_utf8ness, strlen(PL_locale_utf8ness), data/perl-5.32.0/locale.c:5148:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (s < PL_locale_utf8ness + strlen(PL_locale_utf8ness)) { data/perl-5.32.0/locale.c:5162:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). e = PL_locale_utf8ness + strlen(PL_locale_utf8ness); data/perl-5.32.0/locale.c:5378:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). print_bytes_for_locale(errstr, errstr + strlen(errstr), 0); data/perl-5.32.0/locale.c:5634:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(ret) < sizeof(ret)); data/perl-5.32.0/malloc.c:277:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). # define fatalcroak(mess) (write(2, (mess), strlen(mess)), exit(2)) data/perl-5.32.0/malloc.c:1058:100: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define MYMALLOC_WRITE2STDERR(s) PERL_UNUSED_RESULT(PerlLIO_write(PerlIO_fileno(PerlIO_stderr()),s,strlen(s))) data/perl-5.32.0/malloc.c:2107:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). MEM_SIZE l = strlen(s); data/perl-5.32.0/mg.c:1037:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(PL_phase_names[PL_phase])); data/perl-5.32.0/mg.c:1757:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). PL_psig_name[i] = newSVpvn(name, strlen(name)); data/perl-5.32.0/mg.c:3323:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return whichsig_pvn(sig, strlen(sig)); data/perl-5.32.0/mg.c:3335:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(*sigv) == len && memEQ(sig,*sigv, len)) data/perl-5.32.0/nostdio.h:38:8: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #undef fgetc data/perl-5.32.0/nostdio.h:56:8: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #undef getc data/perl-5.32.0/nostdio.h:91:9: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define fgetc(f) _CANNOT _fgetc_ data/perl-5.32.0/nostdio.h:95:9: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define getc(f) _CANNOT _getc_ data/perl-5.32.0/numeric.c:1320:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). end2 = s + strlen(s); data/perl-5.32.0/numeric.c:1620:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). : strlen(orig)); /* one past the last */ data/perl-5.32.0/op.c:5126:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(attrstr); data/perl-5.32.0/op.c:9424:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Perl_cop_store_label(aTHX_ cop, label, strlen(label), utf8); data/perl-5.32.0/op.c:10297:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (l == strlen(s)) { data/perl-5.32.0/op.c:11813:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return newCONSTSUB_flags(stash, name, name ? strlen(name) : 0, 0, sv); data/perl-5.32.0/op.c:11952:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name, name ? strlen(name) : 0, subaddr, filename, NULL, NULL, 0 data/perl-5.32.0/op.c:11963:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name, name ? strlen(name) : 0, subaddr, filename, proto, NULL, flags data/perl-5.32.0/op.c:11972:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name, strlen(name), subaddr, NULL, NULL, NULL, 0 data/perl-5.32.0/op.h:659:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cv_ckproto_len_flags((cv), (gv), (p), (p) ? strlen(p) : 0, 0) data/perl-5.32.0/os2/dl_os2.c:118:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(path) >= sizeof(tmp)) data/perl-5.32.0/os2/dl_os2.c:123:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (beg = dot = path + strlen(path); data/perl-5.32.0/os2/dl_os2.c:132:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(tmp+n, dot, strlen(dot)+1); data/perl-5.32.0/os2/dl_os2.c:176:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(err); data/perl-5.32.0/os2/dl_os2.c:179:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, err, len+1); data/perl-5.32.0/os2/dl_os2.c:180:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (fail[0] && len + strlen(fail) < sizeof(buf) - 100) data/perl-5.32.0/os2/os2.c:349:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). write(2,buf,strlen(buf)); data/perl-5.32.0/os2/os2.c:373:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). write(2,buf,strlen(buf)); data/perl-5.32.0/os2/os2.c:1038:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(real_name); data/perl-5.32.0/os2/os2.c:1381:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). STRLEN l = strlen(PL_sh_path); data/perl-5.32.0/os2/os2.c:1383:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Newx(news, strlen(cmd) - 7 + l + 1, char); data/perl-5.32.0/os2/os2.c:1747:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). STRLEN l = strlen(name); data/perl-5.32.0/os2/os2.c:1846:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(p); data/perl-5.32.0/os2/os2.c:1847:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tpath = (char *)malloc(len + strlen(TMPPATH1) + 2); data/perl-5.32.0/os2/os2.c:2033:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(fname, s, 8); data/perl-5.32.0/os2/os2.c:2034:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(s); data/perl-5.32.0/os2/os2.c:2096:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = os2error_buf + strlen(os2error_buf); data/perl-5.32.0/os2/os2.c:2105:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = os2error_buf + strlen(os2error_buf); data/perl-5.32.0/os2/os2.c:2192:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!oname || strlen(oname) >= l) data/perl-5.32.0/os2/os2.c:2242:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = dir_subst(s, strlen(s), b, sizeof b, 0, "handler_perl_sh"); data/perl-5.32.0/os2/os2.c:2247:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = dir_subst(s, strlen(s), b, sizeof b, 0, "handler_perllib_from"); data/perl-5.32.0/os2/os2.c:2248:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). oldl = strlen(s); data/perl-5.32.0/os2/os2.c:2253:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = dir_subst(s, strlen(s), b, sizeof b, 0, "handler_perllib_to"); data/perl-5.32.0/os2/os2.c:2254:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). newl = strlen(s); data/perl-5.32.0/os2/os2.c:2288:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). froml = strlen(from) + 1; data/perl-5.32.0/os2/os2.c:2295:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tol = strlen(INSTALL_PREFIX); data/perl-5.32.0/os2/os2.c:2347:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tol = strlen(to); data/perl-5.32.0/os2/os2.c:2395:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(s); data/perl-5.32.0/os2/os2.c:2433:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). oldl = strlen(s); data/perl-5.32.0/os2/os2.c:2445:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(s); data/perl-5.32.0/os2/os2.c:3527:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Copy(path, p1 + 2, strlen(path) + 1, char); data/perl-5.32.0/os2/os2.c:3566:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(p1); data/perl-5.32.0/os2/os2.c:3572:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Copy(path, p1 + l, strlen(path) + 1, char); data/perl-5.32.0/os2/os2.c:3589:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(RETVAL); data/perl-5.32.0/os2/os2.c:3650:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DosWrite(2, msg1, strlen(msg1), &rc); data/perl-5.32.0/os2/os2.c:3651:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DosWrite(2, msg2, strlen(msg2), &rc); data/perl-5.32.0/os2/os2.c:3652:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DosWrite(2, msg3, strlen(msg3), &rc); data/perl-5.32.0/os2/os2.c:3679:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(to); data/perl-5.32.0/os2/os2.c:3724:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pre = dir_subst(pre, strlen(pre), buf1, sizeof buf1, dir_subst_pathlike, msg); data/perl-5.32.0/os2/os2.c:3727:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(pre); data/perl-5.32.0/os2/os2.c:3747:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). to += strlen(to); data/perl-5.32.0/os2/os2.c:3755:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). post = dir_subst(post, strlen(post), buf1, sizeof buf1, dir_subst_pathlike, msg); data/perl-5.32.0/os2/os2.c:3758:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(post); data/perl-5.32.0/os2/os2.c:4275:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( do_open6(gv, perltype, strlen(perltype), perlio, NULL, 0) ) data/perl-5.32.0/os2/os2.c:4402:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = strlen(b.pInfo.szName); data/perl-5.32.0/os2/os2.c:4727:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(buf + strlen(buf), data/perl-5.32.0/os2/os2.c:4736:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(buf + strlen(buf), data/perl-5.32.0/os2/os2.c:4738:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DosWrite(2, buf, strlen(buf), &out); data/perl-5.32.0/os2/os2.c:4752:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DosWrite(2, buf, strlen(buf), &out); data/perl-5.32.0/os2/os2.c:4850:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DosWrite(2, buf, strlen(buf), &out); data/perl-5.32.0/os2/os2.c:4897:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). e = e + strlen(e) + 1; data/perl-5.32.0/os2/os2.c:4904:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). e = e + strlen(e) + 1; data/perl-5.32.0/os2/os2.c:4956:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(perl_sh_installed); data/perl-5.32.0/os2/os2.c:4961:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Newx(PL_sh_path, strlen(SH_PATH) + 1, char); data/perl-5.32.0/os2/os2.c:4965:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(shell), i; data/perl-5.32.0/os2/os2.c:4970:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(PL_sh_path, shell, l); data/perl-5.32.0/os2/os2.c:4999:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DosWrite(2, buf, strlen(buf), &rc); data/perl-5.32.0/os2/os2.c:5082:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). STRLEN l = strlen(s); data/perl-5.32.0/os2/os2.c:5107:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). STRLEN l = strlen(s); data/perl-5.32.0/os2/os2ish.h:374:9: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. #define usleep(usec) ((void)async_mssleep(((usec)+500)/1000, 500)) data/perl-5.32.0/os2/perlrexx.c:94:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s += strlen(s); data/perl-5.32.0/os2/perlrexx.c:97:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s += strlen(s); data/perl-5.32.0/os2/perlrexx.c:138:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). retstr->strlength = strlen (retstr->strptr); data/perl-5.32.0/os2/perlrexx.c:165:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). retstr->strlength = strlen (retstr->strptr); data/perl-5.32.0/os2/perlrexx.c:179:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). retstr->strlength = strlen (retstr->strptr); data/perl-5.32.0/os2/perlrexx.c:186:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(last_error); data/perl-5.32.0/os2/perlrexx.c:195:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). retstr->strlength = strlen(retstr->strptr); data/perl-5.32.0/pad.c:651:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return pad_add_name_pvn(name, strlen(name), flags, typestash, ourstash); data/perl-5.32.0/pad.c:999:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return pad_findmy_pvn(name, strlen(name), flags); data/perl-5.32.0/perl.c:271:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). grok_number(env_pv, strlen(env_pv), &seed) != IS_NUMBER_IN_UV) { data/perl-5.32.0/perl.c:336:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen(PERL_HASH_SEED) >= PERL_HASH_SEED_BYTES ); data/perl-5.32.0/perl.c:539:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). got = read(sock, buffer + 1, *buffer); data/perl-5.32.0/perl.c:845:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unsigned char length = (unsigned char) strlen(where); data/perl-5.32.0/perl.c:2218:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). STRLEN len = strlen(s); data/perl-5.32.0/perl.c:2241:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s += strlen(s); data/perl-5.32.0/perl.c:2394:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SV *sitelib_sv = mayberelocate(raw_sitelib, strlen(raw_sitelib), data/perl-5.32.0/perl.c:2896:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return get_cvn_flags(name, strlen(name), flags); data/perl-5.32.0/perl.c:2971:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(methname); data/perl-5.32.0/perl.c:3432:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char* e = *s + strlen(*s); data/perl-5.32.0/perl.c:3546:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). end = s + strlen(s); data/perl-5.32.0/perl.c:3677:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). end = s + strlen(s); data/perl-5.32.0/perl.c:4017:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = scriptname + strlen(scriptname); data/perl-5.32.0/perl.c:4092:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && strlen(scriptname) == sizeof(tmpname) - 1) data/perl-5.32.0/perl.c:4805:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). S_incpush_use_sep(aTHX_ sitearch, strlen(sitearch), 0x0); data/perl-5.32.0/perl.c:4812:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). S_incpush_use_sep(aTHX_ sitelib, strlen(sitelib), 0x0); data/perl-5.32.0/perl.c:4887:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(unix); data/perl-5.32.0/perl.c:5137:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(p); data/perl-5.32.0/perl.h:1015:14: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. EXTERN_C int usleep(unsigned int); data/perl-5.32.0/perl.h:1257:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). # define panic_write2(s) write(2, s, strlen(s)) data/perl-5.32.0/perlio.c:722:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(name); data/perl-5.32.0/perlio.c:725:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const STRLEN this_len = strlen(f->name); data/perl-5.32.0/perlio.c:1583:35: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). Perl_PerlIO_or_Base(f, Read, read, -1, (aTHX_ f, vbuf, count)); data/perl-5.32.0/perlio.c:3438:7: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (fgetc(s) != EOF) /* get char back again */ data/perl-5.32.0/perlio.c:4985:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return PerlIO_write(f, s, strlen(s)); data/perl-5.32.0/perlio.c:5071:22: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). int old_umask = umask(0177); data/perl-5.32.0/perlio.c:5091:6: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(old_umask); data/perl-5.32.0/pp_ctl.c:2595:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). : (label_len = strlen(cPVOP->op_pv), cPVOP->op_pv); data/perl-5.32.0/pp_ctl.c:3041:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). label_len = strlen(label); data/perl-5.32.0/pp_ctl.c:3893:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unixlen = strlen(unixname); data/perl-5.32.0/pp_sys.c:3849:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Size_t size = strlen(cmd) + (strlen(filename) * 2) + 10; data/perl-5.32.0/pp_sys.c:3849:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Size_t size = strlen(cmd) + (strlen(filename) * 2) + 10; data/perl-5.32.0/pp_sys.c:3856:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (s = cmdline + strlen(cmdline); *filename; ) { data/perl-5.32.0/reentr.c:393:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). key = Perl_keyword (aTHX_ f, strlen(f), FALSE /* not feature enabled */); data/perl-5.32.0/regcomp.c:967:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Size_t format_size = strlen(m) + strlen(REPORT_LOCATION)+ 1;\ data/perl-5.32.0/regcomp.c:967:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Size_t format_size = strlen(m) + strlen(REPORT_LOCATION)+ 1;\ data/perl-5.32.0/regcomp.c:21571:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (strlen(s) > PL_dump_re_max_len ? "..." : "")); data/perl-5.32.0/regcomp.c:22151:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). STRLEN len = strlen(pat); data/perl-5.32.0/regcomp.c:23588:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const STRLEN key_len = strlen((const char *) key); data/perl-5.32.0/regcomp.c:23631:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). UTF8fARG(is_utf8, strlen(pkgname), pkgname)); data/perl-5.32.0/regcomp.c:23945:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const Size_t len = strlen(entry); data/perl-5.32.0/regcomp.c:24773:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SSize_t excess_exponent_len = strlen(cur_ptr) - 2; data/perl-5.32.0/regcomp.c:24784:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(cur_ptr) - excess_leading_zeros data/perl-5.32.0/regcomp.c:24871:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). table_index = do_uniprop_match(canonical, strlen(canonical)); data/perl-5.32.0/regcomp.c:25468:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (void) handle_names_wildcard(empties_pat, strlen(empties_pat), &empties); data/perl-5.32.0/sv.c:3069:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const STRLEN typelen = strlen(typestr); data/perl-5.32.0/sv.c:5041:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(ptr); data/perl-5.32.0/sv.c:5625:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(ptr); data/perl-5.32.0/sv.c:5651:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_catpvn_flags(dstr, sstr, strlen(sstr), flags); data/perl-5.32.0/sv.c:9423:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_setpvn(sv, s, len || s == NULL ? len : strlen(s)); data/perl-5.32.0/sv.c:9575:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return newSVpvn_share(src, strlen(src), hash); data/perl-5.32.0/sv.c:9634:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_vsetpvfn(sv, pat, strlen(pat), args, NULL, 0, NULL); data/perl-5.32.0/sv.c:9844:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_resetpvn(*s ? s : NULL, strlen(s), stash); data/perl-5.32.0/sv.c:10853:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_vsetpvfn(sv, pat, strlen(pat), args, NULL, 0, NULL); data/perl-5.32.0/sv.c:10891:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_vsetpvfn(sv, pat, strlen(pat), args, NULL, 0, NULL); data/perl-5.32.0/sv.c:10911:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_vcatpvfn_flags(sv, pat, strlen(pat), &args, NULL, 0, NULL, SV_GMAGIC|SV_SMAGIC); data/perl-5.32.0/sv.c:10929:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_vcatpvfn_flags(sv, pat, strlen(pat), &args, NULL, 0, NULL, SV_GMAGIC|SV_SMAGIC); data/perl-5.32.0/sv.c:10958:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_vcatpvfn_flags(sv, pat, strlen(pat), &args, NULL, 0, NULL, SV_GMAGIC|SV_SMAGIC); data/perl-5.32.0/sv.c:10979:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_vcatpvfn_flags(sv, pat, strlen(pat), args, NULL, 0, NULL, SV_GMAGIC|SV_SMAGIC); data/perl-5.32.0/sv.c:10998:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_vcatpvfn_flags(sv, pat, strlen(pat), &args, NULL, 0, NULL, SV_GMAGIC|SV_SMAGIC); data/perl-5.32.0/sv.c:11018:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_vcatpvfn(sv, pat, strlen(pat), args, NULL, 0, NULL); data/perl-5.32.0/sv.c:12409:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). elen = strlen(eptr); data/perl-5.32.0/sv.c:13130:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). elen = strlen(ebuf); data/perl-5.32.0/sv.c:13700:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). # define d_namlen(d) strlen((d)->d_name) data/perl-5.32.0/symbian/symbian_proto.h:23:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extern size_t strlen(const char *s); data/perl-5.32.0/symbian/symbian_proto.h:39:15: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). extern char* strncpy(char *dst, const char *src, size_t n); data/perl-5.32.0/symbian/symbian_utils.cpp:167:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const TPtrC8 kerrp((const unsigned char *)kerr, strlen(kerr)); data/perl-5.32.0/symbian/symbian_utils.cpp:168:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const TPtrC8 descp((const unsigned char *)desc, strlen(desc)); data/perl-5.32.0/symbian/symbianish.h:170:9: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. #define usleep(u) symbian_usleep(u) data/perl-5.32.0/taint.c:183:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SV * const * const svp = hv_fetch(GvHVn(PL_envgv), *e, strlen(*e), FALSE); data/perl-5.32.0/toke.c:493:59: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). PerlIO_printf(Perl_debug_log, fmt, pv_display(tmp, s, strlen(s), 0, 60)); data/perl-5.32.0/toke.c:1124:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lex_stuff_pvn(pv, strlen(pv), flags); data/perl-5.32.0/toke.c:2159:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const STRLEN len = s[1] ? strlen(s) : 1; /* s = "\"" see yylex */ data/perl-5.32.0/toke.c:4374:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = (int)strlen(tmpbuf); data/perl-5.32.0/toke.c:6778:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gv_stashpvn(PL_tokenbuf, strlen(PL_tokenbuf), data/perl-5.32.0/toke.c:7237:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). UTF8fARG(UTF, strlen(PL_tokenbuf), data/perl-5.32.0/toke.c:9212:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pv_display(tmp, s, strlen(s), 0, 60)); data/perl-5.32.0/toke.c:9485:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const STRLEN tokenbuf_len = strlen(PL_tokenbuf); data/perl-5.32.0/toke.c:12240:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return yyerror_pvn(s, strlen(s), 0); data/perl-5.32.0/toke.c:12247:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return yyerror_pvn(s, strlen(s), flags); data/perl-5.32.0/universal.c:163:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return sv_derived_from_svpvn(sv, NULL, name, strlen(name), 0); data/perl-5.32.0/universal.c:180:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return sv_derived_from_svpvn(sv, NULL, name, strlen(name), flags); data/perl-5.32.0/universal.c:313:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SvCUR_set(methodname, strlen(PL_isa_DOES)); data/perl-5.32.0/universal.c:339:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return sv_does_sv(sv, newSVpvn_flags(name, strlen(name), SVs_TEMP), 0); data/perl-5.32.0/universal.c:355:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return sv_does_sv(sv, newSVpvn_flags(name, strlen(name), SVs_TEMP | flags), flags); data/perl-5.32.0/utf8.c:3176:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (! hv_fetch(PL_seen_deprecated_macro, key, strlen(key), 0)) { data/perl-5.32.0/utf8.c:3181:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(key), &PL_sv_undef, 0)) data/perl-5.32.0/utf8.c:4095:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_catpvn(dsv, mnemonic, strlen(mnemonic)); data/perl-5.32.0/util.c:1088:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const STRLEN pvlen = strlen(pv)+1; data/perl-5.32.0/util.c:1149:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pvlen = strlen(pv)+1; data/perl-5.32.0/util.c:1305:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_vsetpvfn(sv, pat, strlen(pat), args, NULL, 0, NULL); data/perl-5.32.0/util.c:1518:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_vsetpvfn(sv, pat, strlen(pat), args, NULL, 0, NULL); data/perl-5.32.0/util.c:2163:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Size_t vlen, nlen = strlen(nam); data/perl-5.32.0/util.c:2183:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const Size_t len = strlen(environ[j]); data/perl-5.32.0/util.c:2212:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vlen = strlen(val); data/perl-5.32.0/util.c:2239:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const Size_t nlen = strlen(nam); data/perl-5.32.0/util.c:2240:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const Size_t vlen = strlen(val); data/perl-5.32.0/util.c:2249:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const Size_t nlen = strlen(nam); data/perl-5.32.0/util.c:2254:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vlen = strlen(val); data/perl-5.32.0/util.c:2280:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const Size_t nlen = strlen(nam); data/perl-5.32.0/util.c:2286:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vlen = strlen(val); data/perl-5.32.0/util.c:3215:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(scriptname); data/perl-5.32.0/util.c:3238:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(tmpbuf) + strlen(scriptname) data/perl-5.32.0/util.c:3238:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(tmpbuf) + strlen(scriptname) data/perl-5.32.0/util.c:3273:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(scriptname); data/perl-5.32.0/util.c:3293:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bufend = s + strlen(s); data/perl-5.32.0/util.c:3310:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (len + 1 + strlen(scriptname) + MAX_EXT_LEN >= sizeof tmpbuf) data/perl-5.32.0/util.c:3325:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(tmpbuf); data/perl-5.32.0/util.c:3484:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *len = strlen(env_trans); data/perl-5.32.0/util.c:3914:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const int fmtlen = strlen(fmt); data/perl-5.32.0/util.c:4039:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namelen = strlen(dp->d_name); data/perl-5.32.0/util.c:4432:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char* endptr = p + strlen(p); data/perl-5.32.0/util.c:4819:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char* endptr = pmlenv + strlen(pmlenv); data/perl-5.32.0/util.c:4975:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(format); data/perl-5.32.0/util.c:5210:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = e ? e - *environ : (int)strlen(*environ); data/perl-5.32.0/util.c:5569:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). used = strlen(dst); data/perl-5.32.0/util.c:5570:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(src); data/perl-5.32.0/util.c:5603:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(src); data/perl-5.32.0/util.c:5714:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). STRLEN len = strlen(templte); data/perl-5.32.0/util.c:5973:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *symbol_name_size = strlen(func); data/perl-5.32.0/util.c:6318:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dl_info->dli_fname ? strlen(dl_info->dli_fname) : 0; data/perl-5.32.0/util.c:6320:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dl_info->dli_sname ? strlen(dl_info->dli_sname) : 0; data/perl-5.32.0/vms/munchconfig.c:121:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). LineBufferLength = strlen(LineBuffer); data/perl-5.32.0/vms/munchconfig.c:151:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). LineBufferLength = strlen(LineBuffer); data/perl-5.32.0/vms/munchconfig.c:179:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). TempLength = strlen(TempValue); data/perl-5.32.0/vms/munchconfig.c:188:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(TempValue, "\n"); data/perl-5.32.0/vms/munchconfig.c:193:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). TempLength = strlen(TempValue); data/perl-5.32.0/vms/munchconfig.c:241:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). LineBufferLength = strlen(LineBuffer); data/perl-5.32.0/vms/munchconfig.c:361:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). TempLength = strlen(LineBuffer); data/perl-5.32.0/vms/munchconfig.c:381:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CopiedBufferLength = strlen(TempBuffer); data/perl-5.32.0/vms/munchconfig.c:392:11: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(TempBuffer, "~"); data/perl-5.32.0/vms/munchconfig.c:393:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CopiedBufferLength = strlen(TempBuffer); data/perl-5.32.0/vms/vms.c:273:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_dsc.dsc$w_length = strlen(logname); data/perl-5.32.0/vms/vms.c:691:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path_desc.dsc$w_length = strlen(path); data/perl-5.32.0/vms/vms.c:845:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lnmdsc.dsc$w_length = strlen(lnm); data/perl-5.32.0/vms/vms.c:981:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(eqv,eqvdsc.dsc$a_pointer,eqvlen); data/perl-5.32.0/vms/vms.c:1005:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). eqvlen = strlen(eqv); data/perl-5.32.0/vms/vms.c:1104:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(eqv); data/perl-5.32.0/vms/vms.c:1200:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *len = strlen(buf); data/perl-5.32.0/vms/vms.c:1447:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(lnm, key, keylen); data/perl-5.32.0/vms/vms.c:1449:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv = newSVpvn(eqv, strlen(eqv)); data/perl-5.32.0/vms/vms.c:1468:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hv_store(envhv,ppfs[i],strlen(ppfs[i]),sv,0); data/perl-5.32.0/vms/vms.c:1562:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). eqvdsc.dsc$w_length = strlen(eqv); data/perl-5.32.0/vms/vms.c:1597:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ile->buflen = strlen(c); data/perl-5.32.0/vms/vms.c:1654:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(lnm); data/perl-5.32.0/vms/vms.c:1684:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d_name.dsc$w_length = strlen(name); data/perl-5.32.0/vms/vms.c:1686:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lnmlst[0].buflen = strlen(eqv); data/perl-5.32.0/vms/vms.c:1729:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). usrdsc.dsc$w_length = strlen(usrname); data/perl-5.32.0/vms/vms.c:1746:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). txtdsc.dsc$w_length = strlen(textpasswd); data/perl-5.32.0/vms/vms.c:1837:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fildsc.dsc$w_length = strlen(vmsname); data/perl-5.32.0/vms/vms.c:2045:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). STRLEN dirlen = strlen(dir); data/perl-5.32.0/vms/vms.c:2068:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). STRLEN dirlen = strlen(dir); data/perl-5.32.0/vms/vms.c:2117:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). STRLEN speclen = strlen(file_spec); data/perl-5.32.0/vms/vms.c:2169:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmpnam(cp+strlen(cp)); data/perl-5.32.0/vms/vms.c:3556:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d_dev.dsc$w_length = strlen(out); data/perl-5.32.0/vms/vms.c:4085:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). customization_dsc.dsc$w_length = strlen(customization); data/perl-5.32.0/vms/vms.c:4269:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vmspipedsc.dsc$w_length = strlen(tfilebuf); data/perl-5.32.0/vms/vms.c:4295:73: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Perl_warner(aTHX_ packWARN(WARN_PIPE),"Can't pipe \"%*s\": %s", strlen(cmd), cmd, Strerror(errno)); data/perl-5.32.0/vms/vms.c:4486:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d_sym_cmd.dsc$w_length = strlen(cmd_sym_name); data/perl-5.32.0/vms/vms.c:4491:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(p) > MAX_DCL_SYMBOL) { data/perl-5.32.0/vms/vms.c:4494:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p += strlen(p); data/perl-5.32.0/vms/vms.c:4518:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d_sym_cmd.dsc$w_length = strlen(cmd_sym_name); data/perl-5.32.0/vms/vms.c:4998:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rms_set_fna(myfab, mynam, (char *)vmsname, strlen(vmsname)); /* cast ok */ data/perl-5.32.0/vms/vms.c:5075:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fildsc.dsc$w_length = strlen(vmsname); data/perl-5.32.0/vms/vms.c:5379:12: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(vms_dst,"."); data/perl-5.32.0/vms/vms.c:5386:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). old_file_dsc.dsc$w_length = strlen(src_st.st_devnam); data/perl-5.32.0/vms/vms.c:5391:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). new_file_dsc.dsc$w_length = strlen(vms_dst); data/perl-5.32.0/vms/vms.c:5550:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rms_set_fna(myfab, mynam, (char *)in_spec, strlen(in_spec)); /* cast ok */ data/perl-5.32.0/vms/vms.c:5573:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (char *)def_spec, strlen(def_spec)); /* cast ok */ data/perl-5.32.0/vms/vms.c:6028:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen(dir); data/perl-5.32.0/vms/vms.c:6052:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen(trndir); data/perl-5.32.0/vms/vms.c:6200:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). e_len = strlen(cp2); data/perl-5.32.0/vms/vms.c:6202:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vs_len = strlen(cp3); data/perl-5.32.0/vms/vms.c:6274:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rms_set_fna(dirfab, dirnam, trndir, strlen(trndir)); data/perl-5.32.0/vms/vms.c:6396:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). retlen = strlen(my_esa); data/perl-5.32.0/vms/vms.c:6716:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). trnlen = strlen(trndir); data/perl-5.32.0/vms/vms.c:6851:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). STRLEN dir_len = strlen(trndir); data/perl-5.32.0/vms/vms.c:6884:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). e_len = strlen(lastdot); data/perl-5.32.0/vms/vms.c:7044:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(spec) > (VMS_MAXRSS-1)) { data/perl-5.32.0/vms/vms.c:7075:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(rslt,"\n"); data/perl-5.32.0/vms/vms.c:7367:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ulen = strlen(rslt); data/perl-5.32.0/vms/vms.c:7477:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unixlen = strlen(unixpath); data/perl-5.32.0/vms/vms.c:7535:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path_len = strlen(vmspath); data/perl-5.32.0/vms/vms.c:7554:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rms_set_fna(myfab, mynam, (char *) vmspath, strlen(vmspath)); /* cast ok */ data/perl-5.32.0/vms/vms.c:7677:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(unixptr); data/perl-5.32.0/vms/vms.c:7729:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unixlen = strlen(unixptr); data/perl-5.32.0/vms/vms.c:8071:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vmslen = strlen(vmspath); /* We know we're truncating. */ data/perl-5.32.0/vms/vms.c:8609:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). trnend = islnm ? strlen(trndev) - 1 : 0; data/perl-5.32.0/vms/vms.c:8982:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vmslen = strlen(vmsified); data/perl-5.32.0/vms/vms.c:9053:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unixlen = strlen(unixified); data/perl-5.32.0/vms/vms.c:9192:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (*ap && '&' == ap[strlen(ap)-1]) data/perl-5.32.0/vms/vms.c:9194:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ap[strlen(ap)-1] = '\0'; data/perl-5.32.0/vms/vms.c:9326:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mbxnam.dsc$w_length = strlen(mbxnam.dsc$a_pointer); data/perl-5.32.0/vms/vms.c:9440:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). item_len = strlen(item); data/perl-5.32.0/vms/vms.c:9458:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filespec.dsc$w_length = strlen(filespec.dsc$a_pointer); data/perl-5.32.0/vms/vms.c:9600:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). value.dsc$w_length = strlen(value.dsc$a_pointer); data/perl-5.32.0/vms/vms.c:9615:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pidstr.dsc$w_length = strlen(pidstr.dsc$a_pointer); data/perl-5.32.0/vms/vms.c:9710:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ulen = strlen(argvp[0][0]); data/perl-5.32.0/vms/vms.c:9847:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). reslen = strlen(fspec); data/perl-5.32.0/vms/vms.c:9858:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmplen = strlen(unixified); data/perl-5.32.0/vms/vms.c:10101:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Newx(dd->pattern,strlen(dir)+sizeof "*.*" + 1,char); data/perl-5.32.0/vms/vms.c:10116:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dd->pat.dsc$w_length = strlen(dd->pattern); data/perl-5.32.0/vms/vms.c:10180:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(dd->pattern); data/perl-5.32.0/vms/vms.c:10551:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cmdlen = strlen(incmd); data/perl-5.32.0/vms/vms.c:10571:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(cmd) > MAX_DCL_LINE_LENGTH) { data/perl-5.32.0/vms/vms.c:10664:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(vmsspec); data/perl-5.32.0/vms/vms.c:10671:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (cp2 = vmsspec + strlen(vmsspec); data/perl-5.32.0/vms/vms.c:10691:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!wordbreak) wordbreak = s + strlen(s); data/perl-5.32.0/vms/vms.c:10727:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(fileno(fp), b, 256); data/perl-5.32.0/vms/vms.c:10744:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). shebang_len = strlen(ALTERNATE_SHEBANG); data/perl-5.32.0/vms/vms.c:10874:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rest_len = strlen(rest); data/perl-5.32.0/vms/vms.c:10875:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vmscmd_len = strlen(vmscmd->dsc$a_pointer); data/perl-5.32.0/vms/vms.c:10881:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vmscmd->dsc$w_length = strlen(vmscmd->dsc$a_pointer); data/perl-5.32.0/vms/vms.c:10892:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vmscmd->dsc$w_length = strlen(cmd); data/perl-5.32.0/vms/vms.c:11106:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(mode, "n"); data/perl-5.32.0/vms/vms.c:11369:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_desc.dsc$w_length= strlen(name); data/perl-5.32.0/vms/vms.c:11403:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ldir= strlen(pwd->pw_unixdir) - 1; data/perl-5.32.0/vms/vms.c:11427:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_desc.dsc$w_length= strlen(name); data/perl-5.32.0/vms/vms.c:11781:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dev_desc.dsc$w_length = strlen (dev); data/perl-5.32.0/vms/vms.c:11803:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (q = dev + strlen(dev); q >= dev; q--) { data/perl-5.32.0/vms/vms.c:11909:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). retlen = namdsc.dsc$w_length = strlen(vmsname); data/perl-5.32.0/vms/vms.c:11927:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). retlen = namdsc.dsc$w_length = strlen(fname); data/perl-5.32.0/vms/vms.c:12351:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rms_set_fna(fab_in, nam, vmsin, strlen(vmsin)); data/perl-5.32.0/vms/vms.c:12418:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rms_set_fna(fab_out, nam_out, vmsout, strlen(vmsout)); data/perl-5.32.0/vms/vms.c:12646:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_usepvn(ST(0),rslt,strlen(rslt)); data/perl-5.32.0/vms/vms.c:12667:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_usepvn(ST(0),vmsified,strlen(vmsified)); data/perl-5.32.0/vms/vms.c:12688:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_usepvn(ST(0),unixified,strlen(unixified)); data/perl-5.32.0/vms/vms.c:12709:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_usepvn(ST(0),fileified,strlen(fileified)); data/perl-5.32.0/vms/vms.c:12730:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_usepvn(ST(0),pathified,strlen(pathified)); data/perl-5.32.0/vms/vms.c:12751:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_usepvn(ST(0),vmspath,strlen(vmspath)); data/perl-5.32.0/vms/vms.c:12772:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_usepvn(ST(0),unixpath,strlen(unixpath)); data/perl-5.32.0/vms/vms.c:12910:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(work_name) + 3 <= max_name_len) { data/perl-5.32.0/vms/vms.c:12928:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(work_name) + 3 > max_name_len) { data/perl-5.32.0/vms/vms.c:12943:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(work_name) + 3 > max_name_len) { data/perl-5.32.0/vms/vms.c:13063:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fname_len = strlen(fname); data/perl-5.32.0/vms/vms.c:13085:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wilddsc.dsc$w_length = strlen(wilddsc.dsc$a_pointer); data/perl-5.32.0/vms/vms.c:13215:10: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(begin,"\n"); data/perl-5.32.0/vms/vms.c:13224:6: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(rstr,"\n"); data/perl-5.32.0/vms/vms.c:13272:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_usepvn(ST(0),rslt,strlen(rslt)); data/perl-5.32.0/vms/vms.c:13300:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_usepvn(ST(0),rslt,strlen(rslt)); data/perl-5.32.0/vms/vms.c:13541:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dvidsc.dsc$w_length=strlen(statbuf.st_dev); data/perl-5.32.0/win32/perlglob.c:59:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(argv[i]); data/perl-5.32.0/win32/perlhost.h:137:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *len = strlen(e); data/perl-5.32.0/win32/perlhost.h:1052:12: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). return umask(pmode); data/perl-5.32.0/win32/perlhost.h:2170:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). STRLEN length = strlen(lpStr)+1; data/perl-5.32.0/win32/perlhost.h:2201:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dwSize += strlen(m_lppEnvList[index]) + 1; data/perl-5.32.0/win32/perlhost.h:2220:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(ptr); data/perl-5.32.0/win32/perlhost.h:2246:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lpTmp += strlen(lpTmp) + 1; data/perl-5.32.0/win32/perlhost.h:2250:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for(dwSize = 1; *lpTmp != '\0'; lpTmp += strlen(lpTmp) + 1) { data/perl-5.32.0/win32/perlhost.h:2252:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dwSize += strlen(lpTmp) + 1; data/perl-5.32.0/win32/perlhost.h:2274:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nLength = strlen(lpEnvPtr) + 1; data/perl-5.32.0/win32/perlhost.h:2283:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nLength = strlen(lpEnvPtr) + 1; data/perl-5.32.0/win32/perlhost.h:2291:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lpStr += strlen(lpLocalEnv) + 1; data/perl-5.32.0/win32/perlhost.h:2296:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lpEnvPtr += strlen(lpEnvPtr) + 1; data/perl-5.32.0/win32/perlhost.h:2308:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lpStr += strlen(lpLocalEnv) + 1; data/perl-5.32.0/win32/perlhost.h:2357:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lpStr += strlen(lpStr) + 1; data/perl-5.32.0/win32/perlhost.h:2369:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lpStr += strlen(lpStr) + 1; data/perl-5.32.0/win32/vdir.h:175:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(pPath); data/perl-5.32.0/win32/vdir.h:188:15: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = wcslen(wBuffer); data/perl-5.32.0/win32/vdir.h:212:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pEnv += strlen(pEnv)+1; data/perl-5.32.0/win32/vdir.h:225:14: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pEnv += wcslen(pEnv)+1; data/perl-5.32.0/win32/vdir.h:247:11: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = wcslen(pPath); data/perl-5.32.0/win32/vdir.h:260:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(ansi); data/perl-5.32.0/win32/vdir.h:392:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen(pInName); data/perl-5.32.0/win32/vdir.h:398:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(szlBuf, pInName, MAX_PATH); data/perl-5.32.0/win32/vdir.h:422:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(szBuffer) > MAX_PATH) data/perl-5.32.0/win32/vdir.h:448:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(szBuffer) > MAX_PATH) data/perl-5.32.0/win32/vdir.h:466:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(pPtr); data/perl-5.32.0/win32/vdir.h:490:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dwSize += strlen(dirTableA[index]) + 5; /* add 1 for trailing NULL and 4 for '=D:=' */ data/perl-5.32.0/win32/vdir.h:510:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(lpDirStr); data/perl-5.32.0/win32/vdir.h:624:18: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = wcslen(pInName); data/perl-5.32.0/win32/vdir.h:630:2: [1] (buffer) wcsncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). wcsncpy(szlBuf, pInName, MAX_PATH); data/perl-5.32.0/win32/vdir.h:654:9: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(wcslen(szBuffer) > MAX_PATH) data/perl-5.32.0/win32/vdir.h:680:11: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (wcslen(szBuffer) > MAX_PATH) data/perl-5.32.0/win32/vdir.h:697:14: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = wcslen(pPtr); data/perl-5.32.0/win32/win32.c:254:40: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(fullname, fullname+4, (wcslen(fullname+4)+1)*sizeof(WCHAR)); data/perl-5.32.0/win32/win32.c:335:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). baselen = strlen(base); data/perl-5.32.0/win32/win32.c:556:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int slen = strlen(str); data/perl-5.32.0/win32/win32.c:723:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Newx(argv, strlen(cmd) / 2 + 2, char*); data/perl-5.32.0/win32/win32.c:724:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Newx(cmd2, strlen(cmd) + 1, char); data/perl-5.32.0/win32/win32.c:842:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(filename); data/perl-5.32.0/win32/win32.c:908:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). idx = strlen(buffer)+1; data/perl-5.32.0/win32/win32.c:932:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(dirp->curr); data/perl-5.32.0/win32/win32.c:968:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). long newsize = endpos + strlen(buffer) + 1; data/perl-5.32.0/win32/win32.c:1462:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(path); data/perl-5.32.0/win32/win32.c:1479:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buffer, path, l); data/perl-5.32.0/win32/win32.c:1506:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(path); data/perl-5.32.0/win32/win32.c:1662:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). STRLEN len = strlen(fdata.cFileName); data/perl-5.32.0/win32/win32.c:1710:19: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t wlen = wcslen(wstr) + 1; data/perl-5.32.0/win32/win32.c:1743:22: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t widelen = wcslen(widename)+1; data/perl-5.32.0/win32/win32.c:1787:19: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). env_len = wcslen(lpWTmp); data/perl-5.32.0/win32/win32.c:1845:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cur = end + strlen(end+1)+2; data/perl-5.32.0/win32/win32.c:1847:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if ((len = strlen(cur))) data/perl-5.32.0/win32/win32.c:1875:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). curitem = (char *) win32_malloc(strlen(name)+1); data/perl-5.32.0/win32/win32.c:2090:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *buf = name->version + strlen(name->version); data/perl-5.32.0/win32/win32.c:2097:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). STRLEN len = strlen(hep->h_name); data/perl-5.32.0/win32/win32.c:2102:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name->nodename, hep->h_name, nodemax); data/perl-5.32.0/win32/win32.c:2830:12: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return getc(pf); data/perl-5.32.0/win32/win32.c:3396:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return read(fd, buf, cnt); data/perl-5.32.0/win32/win32.c:3478:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). clen = strlen(cname); data/perl-5.32.0/win32/win32.c:3510:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). STRLEN curlen = strlen(arg); data/perl-5.32.0/win32/win32.c:3529:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). STRLEN curlen = strlen(arg); data/perl-5.32.0/win32/win32.c:3631:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Newx(fullcmd, (pathstr ? strlen(pathstr) : 0) + cmdlen + 6, char); data/perl-5.32.0/win32/win32.c:3729:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cur = end + strlen(end+1)+2; data/perl-5.32.0/win32/win32.c:3731:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if ((len = strlen(cur))) data/perl-5.32.0/win32/win32.c:3744:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Newx(ptr, strlen(szfilename)+1, char); data/perl-5.32.0/win32/win32.c:3794:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). clen = strlen(cname); data/perl-5.32.0/win32/win32.c:4016:12: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return fgetc(pf); data/perl-5.32.0/win32/win32.c:4034:12: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return getchar(); data/perl-5.32.0/win32/win32.c:4225:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). STRLEN len = strlen(filename); data/perl-5.32.0/win32/win32.c:4434:20: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wide_len = wcslen(wide_dir); data/perl-5.32.0/win32/win32.c:4440:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ansi_len = strlen(ansi_dir); data/perl-5.32.0/win32/win32iop.h:224:8: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #undef getc data/perl-5.32.0/win32/win32iop.h:225:9: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define getc(f) win32_getc(f) data/perl-5.32.0/win32/win32iop.h:257:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define read(fd,b,s) win32_read(fd,b,s) data/perl-5.32.0/win32/win32iop.h:277:9: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define fgetc win32_fgetc data/perl-5.32.0/win32/win32iop.h:281:8: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #undef getchar data/perl-5.32.0/win32/win32iop.h:282:9: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define getchar win32_getchar data/perl-5.32.0/win32/win32sck.c:976:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (s->s_proto && strlen(s->s_proto)) data/perl-5.32.0/win32/win32sck.c:979:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (proto && strlen(proto)) ANALYSIS SUMMARY: Hits = 1712 Lines analyzed = 753241 in approximately 14.46 seconds (52088 lines/second) Physical Source Lines of Code (SLOC) = 646157 Hits@level = [0] 249 [1] 558 [2] 696 [3] 81 [4] 358 [5] 19 Hits@level+ = [0+] 1961 [1+] 1712 [2+] 1154 [3+] 458 [4+] 377 [5+] 19 Hits/KSLOC@level+ = [0+] 3.03487 [1+] 2.64951 [2+] 1.78594 [3+] 0.708806 [4+] 0.58345 [5+] 0.0294046 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.