Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/blockingmaster/dialog.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/blockingmaster/dialog.h
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/blockingmaster/main.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/blockingmaster/masterthread.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/blockingmaster/masterthread.h
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/blockingslave/dialog.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/blockingslave/dialog.h
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/blockingslave/main.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/blockingslave/slavethread.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/blockingslave/slavethread.h
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/cenumerator/main.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/creaderasync/main.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/creaderasync/serialportreader.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/creaderasync/serialportreader.h
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/creadersync/main.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/cwriterasync/main.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/cwriterasync/serialportwriter.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/cwriterasync/serialportwriter.h
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/cwritersync/main.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/enumerator/main.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/master/dialog.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/master/dialog.h
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/master/main.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/slave/dialog.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/slave/dialog.h
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/slave/main.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/slave/slavethread.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/slave/slavethread.h
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/terminal/console.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/terminal/console.h
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/terminal/main.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/terminal/mainwindow.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/terminal/mainwindow.h
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/terminal/settingsdialog.cpp
Examining data/qtserialport-opensource-src-5.15.2/examples/serialport/terminal/settingsdialog.h
Examining data/qtserialport-opensource-src-5.15.2/include/QtSerialPort/5.15.2/QtSerialPort/private/qserialport_p.h
Examining data/qtserialport-opensource-src-5.15.2/include/QtSerialPort/5.15.2/QtSerialPort/private/qserialportinfo_p.h
Examining data/qtserialport-opensource-src-5.15.2/include/QtSerialPort/5.15.2/QtSerialPort/private/qtntdll_p.h
Examining data/qtserialport-opensource-src-5.15.2/include/QtSerialPort/5.15.2/QtSerialPort/private/qtudev_p.h
Examining data/qtserialport-opensource-src-5.15.2/include/QtSerialPort/qserialport.h
Examining data/qtserialport-opensource-src-5.15.2/include/QtSerialPort/qserialportglobal.h
Examining data/qtserialport-opensource-src-5.15.2/include/QtSerialPort/qserialportinfo.h
Examining data/qtserialport-opensource-src-5.15.2/include/QtSerialPort/qtserialportversion.h
Examining data/qtserialport-opensource-src-5.15.2/src/serialport/qserialport.cpp
Examining data/qtserialport-opensource-src-5.15.2/src/serialport/qserialport.h
Examining data/qtserialport-opensource-src-5.15.2/src/serialport/qserialport_p.h
Examining data/qtserialport-opensource-src-5.15.2/src/serialport/qserialport_unix.cpp
Examining data/qtserialport-opensource-src-5.15.2/src/serialport/qserialport_win.cpp
Examining data/qtserialport-opensource-src-5.15.2/src/serialport/qserialportglobal.h
Examining data/qtserialport-opensource-src-5.15.2/src/serialport/qserialportinfo.cpp
Examining data/qtserialport-opensource-src-5.15.2/src/serialport/qserialportinfo.h
Examining data/qtserialport-opensource-src-5.15.2/src/serialport/qserialportinfo_freebsd.cpp
Examining data/qtserialport-opensource-src-5.15.2/src/serialport/qserialportinfo_osx.cpp
Examining data/qtserialport-opensource-src-5.15.2/src/serialport/qserialportinfo_p.h
Examining data/qtserialport-opensource-src-5.15.2/src/serialport/qserialportinfo_unix.cpp
Examining data/qtserialport-opensource-src-5.15.2/src/serialport/qserialportinfo_win.cpp
Examining data/qtserialport-opensource-src-5.15.2/src/serialport/qtntdll_p.h
Examining data/qtserialport-opensource-src-5.15.2/src/serialport/qtudev_p.h
Examining data/qtserialport-opensource-src-5.15.2/src/serialport/qwinoverlappedionotifier.cpp
Examining data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp
Examining data/qtserialport-opensource-src-5.15.2/tests/auto/qserialportinfo/tst_qserialportinfo.cpp
Examining data/qtserialport-opensource-src-5.15.2/tests/auto/qserialportinfoprivate/tst_qserialportinfoprivate.cpp

FINAL RESULTS:

data/qtserialport-opensource-src-5.15.2/examples/serialport/blockingmaster/masterthread.cpp:118:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            if (!serial.open(QIODevice::ReadWrite)) {
data/qtserialport-opensource-src-5.15.2/examples/serialport/blockingslave/slavethread.cpp:110:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            if (!serial.open(QIODevice::ReadWrite)) {
data/qtserialport-opensource-src-5.15.2/examples/serialport/creaderasync/main.cpp:81:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!serialPort.open(QIODevice::ReadOnly)) {
data/qtserialport-opensource-src-5.15.2/examples/serialport/creadersync/main.cpp:79:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!serialPort.open(QIODevice::ReadOnly)) {
data/qtserialport-opensource-src-5.15.2/examples/serialport/cwriterasync/main.cpp:82:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    serialPort.open(QIODevice::WriteOnly);
data/qtserialport-opensource-src-5.15.2/examples/serialport/cwriterasync/main.cpp:85:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!dataFile.open(stdin, QIODevice::ReadOnly)) {
data/qtserialport-opensource-src-5.15.2/examples/serialport/cwritersync/main.cpp:79:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!serialPort.open(QIODevice::WriteOnly)) {
data/qtserialport-opensource-src-5.15.2/examples/serialport/cwritersync/main.cpp:87:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!dataFile.open(stdin, QIODevice::ReadOnly)) {
data/qtserialport-opensource-src-5.15.2/examples/serialport/master/dialog.cpp:109:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (!m_serial.open(QIODevice::ReadWrite)) {
data/qtserialport-opensource-src-5.15.2/examples/serialport/slave/dialog.cpp:114:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (!m_serial.open(QIODevice::ReadWrite)) {
data/qtserialport-opensource-src-5.15.2/examples/serialport/slave/slavethread.cpp:106:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            if (!serial.open(QIODevice::ReadWrite)) {
data/qtserialport-opensource-src-5.15.2/examples/serialport/terminal/mainwindow.cpp:111:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (m_serial->open(QIODevice::ReadWrite)) {
data/qtserialport-opensource-src-5.15.2/src/serialport/qserialport.cpp:545:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
bool QSerialPort::open(OpenMode mode)
data/qtserialport-opensource-src-5.15.2/src/serialport/qserialport.cpp:562:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!d->open(mode))
data/qtserialport-opensource-src-5.15.2/src/serialport/qserialport.cpp:565:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QIODevice::open(mode);
data/qtserialport-opensource-src-5.15.2/src/serialport/qserialport.h:213:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    bool open(OpenMode mode) override;
data/qtserialport-opensource-src-5.15.2/src/serialport/qserialport_p.h:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    reserved_char[1];
data/qtserialport-opensource-src-5.15.2/src/serialport/qserialport_p.h:129:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    bool open(QIODevice::OpenMode mode);
data/qtserialport-opensource-src-5.15.2/src/serialport/qserialport_unix.cpp:309:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
bool QSerialPortPrivate::open(QIODevice::OpenMode mode)
data/qtserialport-opensource-src-5.15.2/src/serialport/qserialport_win.cpp:245:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
bool QSerialPortPrivate::open(QIODevice::OpenMode mode)
data/qtserialport-opensource-src-5.15.2/src/serialport/qserialportinfo_freebsd.cpp:347:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!reader.open(QIODevice::ReadOnly))
data/qtserialport-opensource-src-5.15.2/src/serialport/qserialportinfo_osx.cpp:241:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!reader.open(QIODevice::ReadOnly))
data/qtserialport-opensource-src-5.15.2/src/serialport/qserialportinfo_unix.cpp:181:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!f.open(QIODevice::ReadOnly | QIODevice::Text))
data/qtserialport-opensource-src-5.15.2/src/serialport/qserialportinfo_unix.cpp:211:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!f.open(QIODevice::ReadOnly | QIODevice::Text))
data/qtserialport-opensource-src-5.15.2/src/serialport/qserialportinfo_unix.cpp:483:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!reader.open(QIODevice::ReadOnly))
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:279:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        QCOMPARE(serialPort.open(QIODevice::OpenMode(openMode)), openResult);
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:311:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QCOMPARE(serialPort.open(QIODevice::ReadOnly), openResult);
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:343:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        QVERIFY(serialPort.open(QIODevice::ReadWrite));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:349:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        QVERIFY(serialPort.open(QIODevice::ReadWrite));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:373:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        QVERIFY(serialPort.open(QIODevice::ReadWrite));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:379:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        QVERIFY(serialPort.open(QIODevice::ReadWrite));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:404:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        QVERIFY(serialPort.open(QIODevice::ReadWrite));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:410:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        QVERIFY(serialPort.open(QIODevice::ReadWrite));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:435:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        QVERIFY(serialPort.open(QIODevice::ReadWrite));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:441:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        QVERIFY(serialPort.open(QIODevice::ReadWrite));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:464:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        QVERIFY(serialPort.open(QIODevice::ReadWrite));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:470:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        QVERIFY(serialPort.open(QIODevice::ReadWrite));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:485:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(serialPort.open(QIODevice::ReadWrite));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:524:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(serialPort.open(QIODevice::ReadWrite));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:556:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(serialPort.open(QIODevice::ReadWrite)); // No flow control by default!
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:619:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(dummySerialPort.open(QIODevice::ReadOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:625:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(serialPort.open(QIODevice::WriteOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:654:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(dummySerialPort.open(QIODevice::ReadOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:660:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(serialPort.open(QIODevice::WriteOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:679:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(dummySerialPort.open(QIODevice::ReadOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:682:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(serialPort.open(QIODevice::WriteOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:693:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(dummySerialPort.open(QIODevice::WriteOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:696:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(receiverSerialPort.open(QIODevice::ReadOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:708:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(senderSerialPort.open(QIODevice::WriteOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:712:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(receiverSerialPort.open(QIODevice::ReadOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:726:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(senderSerialPort.open(QIODevice::WriteOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:730:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(receiverSerialPort.open(QIODevice::ReadOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:745:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(senderPort.open(QSerialPort::ReadWrite));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:748:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(receiverPort.open(QSerialPort::ReadWrite));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:783:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(senderPort.open(QSerialPort::WriteOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:786:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(receiverPort.open(QSerialPort::ReadOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:834:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        writeBuffer.open(QIODevice::ReadOnly);
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:869:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(receiverPort.open(QSerialPort::ReadOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:873:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(senderPort.open(QSerialPort::WriteOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:891:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        writeBuffer.open(QIODevice::ReadOnly);
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:929:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(receiverPort.open(QSerialPort::ReadOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:933:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(senderPort.open(QSerialPort::WriteOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:969:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(senderPort.open(QSerialPort::WriteOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:972:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(receiverPort.open(QSerialPort::ReadOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:988:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(senderPort.open(QSerialPort::WriteOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:991:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(receiverPort.open(QSerialPort::ReadOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:1015:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(senderPort.open(QSerialPort::WriteOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:1018:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(receiverPort.open(QSerialPort::ReadOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:1061:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    void open()
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:1063:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (serialPort.open(QSerialPort::ReadWrite)) {
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:1110:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    void open()
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:1112:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (serialPort->open(QSerialPort::ReadWrite))
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:1139:82:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QObject::connect(slave, &SlaveTransactor::ready, &master, &MasterTransactor::open);
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:1174:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(senderPort.open(QSerialPort::WriteOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:1181:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(receiverPort.open(QSerialPort::ReadOnly));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:1207:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    QVERIFY(senderPort.open(QSerialPort::ReadWrite));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:1243:34:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        QVERIFY(senderSerialPort.open(QSerialPort::ReadWrite));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:1247:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        QVERIFY(receiverSerialPort.open(QSerialPort::ReadWrite));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:1265:34:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        QVERIFY(senderSerialPort.open(QSerialPort::ReadWrite));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:1269:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        QVERIFY(receiverSerialPort.open(QSerialPort::ReadWrite));
data/qtserialport-opensource-src-5.15.2/src/serialport/qserialport_win.cpp:702:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    writeChunkBuffer = writeBuffer.read();
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:219:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    QCOMPARE(serialPort.read(&c, 1), qlonglong(-1));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:843:42:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            serialPort.write(writeBuffer.read(++writeChunkSize));
data/qtserialport-opensource-src-5.15.2/tests/auto/qserialport/tst_qserialport.cpp:900:42:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            serialPort.write(writeBuffer.read(++writeChunkSize));

ANALYSIS SUMMARY:

Hits = 84
Lines analyzed = 12459 in approximately 0.38 seconds (32761 lines/second)
Physical Source Lines of Code (SLOC) = 7140
Hits@level = [0]   0 [1]   4 [2]  80 [3]   0 [4]   0 [5]   0
Hits@level+ = [0+]  84 [1+]  84 [2+]  80 [3+]   0 [4+]   0 [5+]   0
Hits/KSLOC@level+ = [0+] 11.7647 [1+] 11.7647 [2+] 11.2045 [3+]   0 [4+]   0 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.