Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/s-nail-14.9.19/include/mx/attachments.h
Examining data/s-nail-14.9.19/include/mx/child.h
Examining data/s-nail-14.9.19/include/mx/cmd-charsetalias.h
Examining data/s-nail-14.9.19/include/mx/cmd-commandalias.h
Examining data/s-nail-14.9.19/include/mx/cmd-csop.h
Examining data/s-nail-14.9.19/include/mx/cmd-edit.h
Examining data/s-nail-14.9.19/include/mx/cmd-filetype.h
Examining data/s-nail-14.9.19/include/mx/cmd-mlist.h
Examining data/s-nail-14.9.19/include/mx/cmd-shortcut.h
Examining data/s-nail-14.9.19/include/mx/cmd-vexpr.h
Examining data/s-nail-14.9.19/include/mx/cmd.h
Examining data/s-nail-14.9.19/include/mx/colour.h
Examining data/s-nail-14.9.19/include/mx/cred-auth.h
Examining data/s-nail-14.9.19/include/mx/cred-md5.h
Examining data/s-nail-14.9.19/include/mx/cred-netrc.h
Examining data/s-nail-14.9.19/include/mx/def.h
Examining data/s-nail-14.9.19/include/mx/dig-msg.h
Examining data/s-nail-14.9.19/include/mx/file-locks.h
Examining data/s-nail-14.9.19/include/mx/file-streams.h
Examining data/s-nail-14.9.19/include/mx/filter-html.h
Examining data/s-nail-14.9.19/include/mx/filter-quote.h
Examining data/s-nail-14.9.19/include/mx/gen-version.h
Examining data/s-nail-14.9.19/include/mx/iconv.h
Examining data/s-nail-14.9.19/include/mx/mailcap.h
Examining data/s-nail-14.9.19/include/mx/mime-type.h
Examining data/s-nail-14.9.19/include/mx/mta-aliases.h
Examining data/s-nail-14.9.19/include/mx/nail.h
Examining data/s-nail-14.9.19/include/mx/nailfuns.h
Examining data/s-nail-14.9.19/include/mx/names.h
Examining data/s-nail-14.9.19/include/mx/net-pop3.h
Examining data/s-nail-14.9.19/include/mx/net-smtp.h
Examining data/s-nail-14.9.19/include/mx/net-socket.h
Examining data/s-nail-14.9.19/include/mx/privacy.h
Examining data/s-nail-14.9.19/include/mx/random.h
Examining data/s-nail-14.9.19/include/mx/sigs.h
Examining data/s-nail-14.9.19/include/mx/termcap.h
Examining data/s-nail-14.9.19/include/mx/termios.h
Examining data/s-nail-14.9.19/include/mx/tty.h
Examining data/s-nail-14.9.19/include/mx/ui-str.h
Examining data/s-nail-14.9.19/include/mx/url.h
Examining data/s-nail-14.9.19/include/su/a-t-t.h
Examining data/s-nail-14.9.19/include/su/avopt.h
Examining data/s-nail-14.9.19/include/su/bits.h
Examining data/s-nail-14.9.19/include/su/code-in.h
Examining data/s-nail-14.9.19/include/su/code-ou.h
Examining data/s-nail-14.9.19/include/su/code.h
Examining data/s-nail-14.9.19/include/su/config.h
Examining data/s-nail-14.9.19/include/su/cs-dict.h
Examining data/s-nail-14.9.19/include/su/cs.h
Examining data/s-nail-14.9.19/include/su/icodec.h
Examining data/s-nail-14.9.19/include/su/mem-bag.h
Examining data/s-nail-14.9.19/include/su/mem.h
Examining data/s-nail-14.9.19/include/su/prime.h
Examining data/s-nail-14.9.19/include/su/sort.h
Examining data/s-nail-14.9.19/include/su/utf.h
Examining data/s-nail-14.9.19/include/su/view.h
Examining data/s-nail-14.9.19/mx-config.h
Examining data/s-nail-14.9.19/src/mx/accmacvar.c
Examining data/s-nail-14.9.19/src/mx/attachments.c
Examining data/s-nail-14.9.19/src/mx/auxlily.c
Examining data/s-nail-14.9.19/src/mx/child.c
Examining data/s-nail-14.9.19/src/mx/cmd-charsetalias.c
Examining data/s-nail-14.9.19/src/mx/cmd-cnd.c
Examining data/s-nail-14.9.19/src/mx/cmd-commandalias.c
Examining data/s-nail-14.9.19/src/mx/cmd-csop.c
Examining data/s-nail-14.9.19/src/mx/cmd-edit.c
Examining data/s-nail-14.9.19/src/mx/cmd-filetype.c
Examining data/s-nail-14.9.19/src/mx/cmd-folder.c
Examining data/s-nail-14.9.19/src/mx/cmd-head.c
Examining data/s-nail-14.9.19/src/mx/cmd-misc.c
Examining data/s-nail-14.9.19/src/mx/cmd-mlist.c
Examining data/s-nail-14.9.19/src/mx/cmd-msg.c
Examining data/s-nail-14.9.19/src/mx/cmd-resend.c
Examining data/s-nail-14.9.19/src/mx/cmd-shortcut.c
Examining data/s-nail-14.9.19/src/mx/cmd-tab.h
Examining data/s-nail-14.9.19/src/mx/cmd-vexpr.c
Examining data/s-nail-14.9.19/src/mx/cmd-write.c
Examining data/s-nail-14.9.19/src/mx/cmd.c
Examining data/s-nail-14.9.19/src/mx/collect.c
Examining data/s-nail-14.9.19/src/mx/colour.c
Examining data/s-nail-14.9.19/src/mx/cred-auth.c
Examining data/s-nail-14.9.19/src/mx/cred-md5.c
Examining data/s-nail-14.9.19/src/mx/cred-netrc.c
Examining data/s-nail-14.9.19/src/mx/dig-msg.c
Examining data/s-nail-14.9.19/src/mx/file-dotlock.h
Examining data/s-nail-14.9.19/src/mx/file-locks.c
Examining data/s-nail-14.9.19/src/mx/file-streams.c
Examining data/s-nail-14.9.19/src/mx/filter-html.c
Examining data/s-nail-14.9.19/src/mx/filter-quote.c
Examining data/s-nail-14.9.19/src/mx/folder.c
Examining data/s-nail-14.9.19/src/mx/gen-cmd-tab.h
Examining data/s-nail-14.9.19/src/mx/gen-okeys.h
Examining data/s-nail-14.9.19/src/mx/gen-tcaps.h
Examining data/s-nail-14.9.19/src/mx/go.c
Examining data/s-nail-14.9.19/src/mx/header.c
Examining data/s-nail-14.9.19/src/mx/iconv.c
Examining data/s-nail-14.9.19/src/mx/ignore.c
Examining data/s-nail-14.9.19/src/mx/imap-search.c
Examining data/s-nail-14.9.19/src/mx/mailcap.c
Examining data/s-nail-14.9.19/src/mx/maildir.c
Examining data/s-nail-14.9.19/src/mx/main.c
Examining data/s-nail-14.9.19/src/mx/message.c
Examining data/s-nail-14.9.19/src/mx/mime-enc.c
Examining data/s-nail-14.9.19/src/mx/mime-param.c
Examining data/s-nail-14.9.19/src/mx/mime-parse.c
Examining data/s-nail-14.9.19/src/mx/mime-type.c
Examining data/s-nail-14.9.19/src/mx/mime.c
Examining data/s-nail-14.9.19/src/mx/mta-aliases.c
Examining data/s-nail-14.9.19/src/mx/names.c
Examining data/s-nail-14.9.19/src/mx/net-gssapi.h
Examining data/s-nail-14.9.19/src/mx/net-pop3.c
Examining data/s-nail-14.9.19/src/mx/net-smtp.c
Examining data/s-nail-14.9.19/src/mx/net-socket.c
Examining data/s-nail-14.9.19/src/mx/obs-imap-cache.c
Examining data/s-nail-14.9.19/src/mx/obs-imap.c
Examining data/s-nail-14.9.19/src/mx/obs-lzw.c
Examining data/s-nail-14.9.19/src/mx/path.c
Examining data/s-nail-14.9.19/src/mx/privacy.c
Examining data/s-nail-14.9.19/src/mx/quit.c
Examining data/s-nail-14.9.19/src/mx/random.c
Examining data/s-nail-14.9.19/src/mx/send.c
Examining data/s-nail-14.9.19/src/mx/sendout.c
Examining data/s-nail-14.9.19/src/mx/shexp.c
Examining data/s-nail-14.9.19/src/mx/sigs.c
Examining data/s-nail-14.9.19/src/mx/spam.c
Examining data/s-nail-14.9.19/src/mx/strings.c
Examining data/s-nail-14.9.19/src/mx/termcap.c
Examining data/s-nail-14.9.19/src/mx/termios.c
Examining data/s-nail-14.9.19/src/mx/thread.c
Examining data/s-nail-14.9.19/src/mx/tls.c
Examining data/s-nail-14.9.19/src/mx/tty-mle.c
Examining data/s-nail-14.9.19/src/mx/tty-prompts.c
Examining data/s-nail-14.9.19/src/mx/ui-str.c
Examining data/s-nail-14.9.19/src/mx/url.c
Examining data/s-nail-14.9.19/src/mx/xtls.c
Examining data/s-nail-14.9.19/src/ps-dotlock/main.c
Examining data/s-nail-14.9.19/src/su/.main.cc
Examining data/s-nail-14.9.19/src/su/avopt.c
Examining data/s-nail-14.9.19/src/su/core-code.c
Examining data/s-nail-14.9.19/src/su/core-errors.c
Examining data/s-nail-14.9.19/src/su/cs-alloc.c
Examining data/s-nail-14.9.19/src/su/cs-ctype.c
Examining data/s-nail-14.9.19/src/su/cs-dict.c
Examining data/s-nail-14.9.19/src/su/cs-find.c
Examining data/s-nail-14.9.19/src/su/cs-misc.c
Examining data/s-nail-14.9.19/src/su/cs-rfind.c
Examining data/s-nail-14.9.19/src/su/cs-tbox.c
Examining data/s-nail-14.9.19/src/su/cs-tools.c
Examining data/s-nail-14.9.19/src/su/cxx-core.cc
Examining data/s-nail-14.9.19/src/su/gen-cs-ctype.h
Examining data/s-nail-14.9.19/src/su/gen-errors.h
Examining data/s-nail-14.9.19/src/su/icodec-dec.c
Examining data/s-nail-14.9.19/src/su/icodec-enc.c
Examining data/s-nail-14.9.19/src/su/mem-alloc.c
Examining data/s-nail-14.9.19/src/su/mem-bag.c
Examining data/s-nail-14.9.19/src/su/mem-tools.c
Examining data/s-nail-14.9.19/src/su/prime.c
Examining data/s-nail-14.9.19/src/su/sort.c
Examining data/s-nail-14.9.19/src/su/utf.c
Examining data/s-nail-14.9.19/src/su/x-assoc-map.h
Examining data/s-nail-14.9.19/src/su/x-mem-tools.h

FINAL RESULTS:

data/s-nail-14.9.19/src/mx/file-locks.c:144:15:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
         sr = readlink(cp, x, i);
data/s-nail-14.9.19/src/mx/attachments.c:265:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
               access(file, R_OK) != 0)){
data/s-nail-14.9.19/src/mx/attachments.c:504:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(prefix, sizeof prefix, A_("#%" PRIu32 " filename: "), attno);
data/s-nail-14.9.19/src/mx/auxlily.c:909:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      i = vsnprintf(s_b.s, s_b.l, format, vac);
data/s-nail-14.9.19/src/mx/auxlily.c:1097:4:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   vfprintf(n_stderr, format, ap);
data/s-nail-14.9.19/src/mx/auxlily.c:1150:4:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   vfprintf(n_stderr, format, ap);
data/s-nail-14.9.19/src/mx/child.c:320:7:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      execvp(argv[0], argv);
data/s-nail-14.9.19/src/mx/cmd-head.c:456:17:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            n = fprintf(f, ((flags & _SFMT) ? "\"%s\"" : "%s"),
data/s-nail-14.9.19/src/mx/cmd-head.c:488:20:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
               n = fprintf(f, "%*" PRIu64 , n, mp->m_uid);
data/s-nail-14.9.19/src/mx/cmd-msg.c:94:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   rv = (fprintf(obuf,
data/s-nail-14.9.19/src/mx/cmd-resend.c:160:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(lp, l, tr, rt->n_name, (rt->n_flink != NIL ? "..." : su_empty));
data/s-nail-14.9.19/src/mx/cmd-resend.c:201:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(lp, l, tr, mft->n_name,
data/s-nail-14.9.19/src/mx/cmd.c:277:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(fp, (*cdpa_curr != NIL ? "%s%s%s, " : "%s%s%s\n"),
data/s-nail-14.9.19/src/mx/collect.c:987:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   fprintf(n_stdout, A_("Interpolating:"));
data/s-nail-14.9.19/src/mx/file-locks.c:216:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if(access(".", W_OK)){
data/s-nail-14.9.19/src/mx/file-locks.c:232:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(itoabuf, sizeof itoabuf, "%" PRIuZ, fdi.fdi_pollmsecs);
data/s-nail-14.9.19/src/mx/file-locks.c:241:7:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      execv(VAL_LIBEXECDIR "/" VAL_UAGENT "-dotlock", n_UNCONST(args));
data/s-nail-14.9.19/src/mx/file-streams.c:412:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if(fs_or_nil != NIL && !access(file, F_OK))
data/s-nail-14.9.19/src/mx/file-streams.c:432:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if(!(osflags & O_EXCL) && fs_or_nil != NIL && !access(file, F_OK))
data/s-nail-14.9.19/src/mx/folder.c:661:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
               access(name, W_OK) < 0) ? 0 : MB_DELE | MB_EDIT);
data/s-nail-14.9.19/src/mx/header.c:1933:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
         snprintf(cbuf, sizeof cbuf,
data/s-nail-14.9.19/src/mx/maildir.c:370:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (access(sub, W_OK) == -1)
data/s-nail-14.9.19/src/mx/net-pop3.c:657:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(o, sizeof o, "LIST %u" NETNL, n);
data/s-nail-14.9.19/src/mx/net-pop3.c:772:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(o, sizeof o, "TOP %u 0" NETNL, number);
data/s-nail-14.9.19/src/mx/net-pop3.c:775:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(o, sizeof o, "RETR %u" NETNL, number);
data/s-nail-14.9.19/src/mx/net-pop3.c:902:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(o, sizeof o, "DELE %u" NETNL, n);
data/s-nail-14.9.19/src/mx/net-pop3.c:946:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(n_stdout, (ok_blook(bsdcompat) || ok_blook(bsdmsgs))
data/s-nail-14.9.19/src/mx/net-smtp.c:211:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
         snprintf(o, sizeof o, NETLINE("EHLO %s"), hostname);
data/s-nail-14.9.19/src/mx/net-smtp.c:237:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(o, sizeof o, NETLINE("HELO %s"), hostname);
data/s-nail-14.9.19/src/mx/net-smtp.c:244:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(o, sizeof o, NETLINE("EHLO %s"), hostname);
data/s-nail-14.9.19/src/mx/net-smtp.c:282:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
         snprintf(o, sizeof o, NETLINE("AUTH XOAUTH2 %s"), b64.s);
data/s-nail-14.9.19/src/mx/net-smtp.c:368:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(o, sizeof o, NETLINE("MAIL FROM:<%s>"), sbp->sb_urlp->url_u_h.s);
data/s-nail-14.9.19/src/mx/net-smtp.c:375:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(o, sizeof o, NETLINE("RCPT TO:<%s@%s>"),
data/s-nail-14.9.19/src/mx/net-smtp.c:378:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(o, sizeof o, NETLINE("RCPT TO:<%s>"), np->n_name);
data/s-nail-14.9.19/src/mx/obs-imap-cache.c:153:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, sizeof buf, "%" PRIu64, uid);
data/s-nail-14.9.19/src/mx/obs-imap-cache.c:179:8:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
   if (fscanf(fp, infofmt, &b, (unsigned long*)&xsize, &xflag,
data/s-nail-14.9.19/src/mx/obs-imap-cache.c:314:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      if (fscanf(obuf, infofmt, &ob, (unsigned long*)&osize, &oflag,
data/s-nail-14.9.19/src/mx/obs-imap-cache.c:324:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf(obuf, infofmt, ob, (unsigned long)m->m_xsize,
data/s-nail-14.9.19/src/mx/obs-imap-cache.c:362:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   fprintf(obuf, infofmt, c, (unsigned long)m->m_xsize, USEBITS(m->m_flag),
data/s-nail-14.9.19/src/mx/obs-imap-cache.c:404:10:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
         fscanf(uvfp, "%" PRIu64 , &uv) != 1 || uv != mp->mb_uidvalidity) {
data/s-nail-14.9.19/src/mx/obs-imap-cache.c:798:10:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
         fscanf(uvfp, "%" PRIu64, &uv) != 1)
data/s-nail-14.9.19/src/mx/obs-imap-cache.c:899:13:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
            fscanf(uvfp, "%" PRIu64, &uv) != 1 || uv != mp->mb_uidvalidity) {
data/s-nail-14.9.19/src/mx/obs-imap.c:2797:10:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         printf((ok_blook(bsdcompat) || ok_blook(bsdmsgs))
data/s-nail-14.9.19/src/mx/path.c:62:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
         rv = (access(name, mode) == 0);
data/s-nail-14.9.19/src/mx/sendout.c:1575:7:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      execv(mta, n_UNCONST(args));
data/s-nail-14.9.19/src/mx/spam.c:220:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf(n_stdout, "\r%s: !%-6" PRIuZ " %6" PRIuZ "/%-6" PRIuZ,
data/s-nail-14.9.19/src/mx/spam.c:229:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf(n_stdout, "\r%s: .%-6" PRIuZ " %6" PRIuZ "/%-6" PRIuZ,
data/s-nail-14.9.19/src/mx/xtls.c:275:13:  [4] (crypto) EVP_des_cbc:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
   {"DES", &EVP_des_cbc},
data/s-nail-14.9.19/src/ps-dotlock/main.c:194:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if(access(fdi.fdi_file_name, (argv[1][0] == 'r' ? R_OK : R_OK | W_OK)))
data/s-nail-14.9.19/src/su/core-code.c:127:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, xfmt, su_program, cp);
data/s-nail-14.9.19/src/su/core-code.c:134:4:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   vfprintf(stderr, fmt, ap);
data/s-nail-14.9.19/src/mx/accmacvar.c:1613:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
         if(LIKELY((cp = getenv(avcp->avc_name)) != NULL)){
data/s-nail-14.9.19/src/mx/accmacvar.c:3352:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
         rv = getenv(vokey);
data/s-nail-14.9.19/src/mx/accmacvar.c:3589:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            char const *evp = getenv(*ap);
data/s-nail-14.9.19/src/mx/auxlily.c:124:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
         if(getenv("LESS") == NIL)
data/s-nail-14.9.19/src/mx/auxlily.c:127:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
         if(getenv("LV") == NIL)
data/s-nail-14.9.19/src/mx/folder.c:93:13:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
         if(realpath(name, mailname) == NIL && su_err_no() != su_ERR_NOENT){
data/s-nail-14.9.19/src/mx/folder.c:531:20:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
         if ((cp = realpath(name, NULL)) != NULL) {
data/s-nail-14.9.19/src/mx/folder.c:538:14:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
         if (realpath(name, cbuf) != NULL)
data/s-nail-14.9.19/src/mx/folder.c:1158:22:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
      if((s->s_dat = realpath(cp, s->s_dat)) != NIL){
data/s-nail-14.9.19/src/mx/random.c:20:17:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define su_FILE random
data/s-nail-14.9.19/include/mx/child.h:63:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const *cc_args[mx_CHILD_MAXARGS]; /* and its optional arguments */
data/s-nail-14.9.19/include/mx/cmd.h:104:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cad_name[12]; /* Name of command */
data/s-nail-14.9.19/include/mx/cmd.h:115:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char cad_name[12];\
data/s-nail-14.9.19/include/mx/cred-md5.h:77:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char buffer[64]; /* input buffer */
data/s-nail-14.9.19/include/mx/cred-md5.h:87:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char *mx_md5_tohex(char hex[mx_MD5_TOHEX_SIZE], void const *vp);
data/s-nail-14.9.19/include/mx/cred-md5.h:87:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char *mx_md5_tohex(char hex[mx_MD5_TOHEX_SIZE], void const *vp);
data/s-nail-14.9.19/include/mx/nail.h:1162:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sl_dat[VFIELD_SIZE(0)];
data/s-nail-14.9.19/include/mx/nail.h:1210:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tc_ctime[32];
data/s-nail-14.9.19/include/mx/nail.h:1249:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mb_imap_delim[8]; /* Directory separator(s), [0] += replacer */
data/s-nail-14.9.19/include/mx/nail.h:1440:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char hf_dat[VFIELD_SIZE(0)];
data/s-nail-14.9.19/include/mx/nail.h:1501:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cw_wd[PATH_MAX];
data/s-nail-14.9.19/include/mx/nail.h:1524:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_month_names[12 + 1][4];
data/s-nail-14.9.19/include/mx/nail.h:1525:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_weekday_names[7 + 1][4];
data/s-nail-14.9.19/include/mx/nail.h:1527:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_uagent[sizeof VAL_UAGENT];
data/s-nail-14.9.19/include/mx/nail.h:1529:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_error[sizeof n_ERROR];
data/s-nail-14.9.19/include/mx/nail.h:1531:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_path_devnull[sizeof n_PATH_DEVNULL];
data/s-nail-14.9.19/include/mx/nail.h:1532:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_0[2];
data/s-nail-14.9.19/include/mx/nail.h:1533:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_1[2];
data/s-nail-14.9.19/include/mx/nail.h:1534:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_m1[3]; /* -1 */
data/s-nail-14.9.19/include/mx/nail.h:1535:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_em[2]; /* Exclamation-mark ! */
data/s-nail-14.9.19/include/mx/nail.h:1536:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_ns[2]; /* Number sign # */
data/s-nail-14.9.19/include/mx/nail.h:1537:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_star[2]; /* Asterisk * */
data/s-nail-14.9.19/include/mx/nail.h:1538:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_hy[2]; /* Hyphen-Minus - */
data/s-nail-14.9.19/include/mx/nail.h:1539:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_qm[2]; /* Question-mark ? */
data/s-nail-14.9.19/include/mx/nail.h:1540:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_at[2]; /* Commercial at @ */
data/s-nail-14.9.19/include/mx/nail.h:1591:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char mailname[PATH_MAX]; /* Name of current file TODO URL/object*/
data/s-nail-14.9.19/include/mx/nail.h:1592:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char displayname[80 - 16]; /* Prettyfied for display TODO URL/obj*/
data/s-nail-14.9.19/include/mx/nail.h:1593:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char prevfile[PATH_MAX]; /* Name of previous file TODO URL/obj */
data/s-nail-14.9.19/include/mx/nailfuns.h:256:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
FL char *      n_c_to_hex_base16(char store[3], char c);
data/s-nail-14.9.19/include/mx/nailfuns.h:256:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
FL char *      n_c_to_hex_base16(char store[3], char c);
data/s-nail-14.9.19/include/mx/nailfuns.h:257:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
FL s32      n_c_from_hex_base16(char const hex[2]);
data/s-nail-14.9.19/include/mx/nailfuns.h:1089:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
FL void        charset_iter_recurse(char *outer_storage[2]); /* TODO LEGACY */
data/s-nail-14.9.19/include/mx/nailfuns.h:1090:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
FL void        charset_iter_restore(char *outer_storage[2]); /* TODO LEGACY */
data/s-nail-14.9.19/include/mx/net-socket.h:67:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char s_rbuf[LINESIZE + 1]; /* for buffered reads */
data/s-nail-14.9.19/include/mx/url.h:46:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char url_proto[16]; /* Communication protocol as 'xy\0://\0' */
data/s-nail-14.9.19/include/su/avopt.h:163:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char avo__buf[Z_ALIGN_PZ(2)];
data/s-nail-14.9.19/include/su/code.h:1322:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char bu_buf[2];
data/s-nail-14.9.19/include/su/code.h:1354:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT_DATA char const su_empty[1];
data/s-nail-14.9.19/include/su/cs-dict.h:147:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char csdn_key[su_VFIELD_SIZE(4)];
data/s-nail-14.9.19/include/su/icodec.h:242:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char *su_ienc(char cbuf[su_IENC_BUFFER_SIZE], u64 value, u8 base,
data/s-nail-14.9.19/include/su/icodec.h:242:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char *su_ienc(char cbuf[su_IENC_BUFFER_SIZE], u64 value, u8 base,
data/s-nail-14.9.19/include/su/utf.h:56:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT_DATA char const su_utf8_replacer[sizeof su_UTF8_REPLACER];
data/s-nail-14.9.19/include/su/utf.h:103:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char const replacer[sizeof su_UTF8_REPLACER];
data/s-nail-14.9.19/src/mx/accmacvar.c:223:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char am_name[VFIELD_SIZE(3)]; /* of this macro */
data/s-nail-14.9.19/src/mx/accmacvar.c:230:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char aml_dat[VFIELD_SIZE(0)];
data/s-nail-14.9.19/src/mx/accmacvar.c:264:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char av_name[VFIELD_SIZE(4)];
data/s-nail-14.9.19/src/mx/accmacvar.c:280:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char avcmb_prefix[4];
data/s-nail-14.9.19/src/mx/accmacvar.c:1767:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char iencbuf[su_IENC_BUFFER_SIZE];
data/s-nail-14.9.19/src/mx/accmacvar.c:1808:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char iencbuf[su_IENC_BUFFER_SIZE];
data/s-nail-14.9.19/src/mx/accmacvar.c:1973:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char iencbuf[su_IENC_BUFFER_SIZE];
data/s-nail-14.9.19/src/mx/accmacvar.c:2482:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char msg[22];
data/s-nail-14.9.19/src/mx/accmacvar.c:3164:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const *macname, *argv[4];
data/s-nail-14.9.19/src/mx/attachments.c:493:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char prefix[32];
data/s-nail-14.9.19/src/mx/auxlily.c:156:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const *env_add[2], *pager;
data/s-nail-14.9.19/src/mx/auxlily.c:212:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char const *env_addon[2];
data/s-nail-14.9.19/src/mx/auxlily.c:363:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
FL char *
data/s-nail-14.9.19/src/mx/auxlily.c:364:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
n_c_to_hex_base16(char store[3], char c){
data/s-nail-14.9.19/src/mx/auxlily.c:377:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
n_c_from_hex_base16(char const hex[2]){
data/s-nail-14.9.19/src/mx/auxlily.c:762:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char buf[32]; /* TODO static buffer (-> datetime_to_format()) */
data/s-nail-14.9.19/src/mx/child.c:256:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *argv[128 + 4]; /* TODO magic constant, fixed size -> su_vector */
data/s-nail-14.9.19/src/mx/child.c:407:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char ebuf[sizeof(ccp->cc_error)];
data/s-nail-14.9.19/src/mx/child.c:480:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      ccp->cc_fds[0] = fd = open(n_path_devnull, O_RDONLY);
data/s-nail-14.9.19/src/mx/child.c:488:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      ccp->cc_fds[1] = fd = open(n_path_devnull, O_WRONLY);
data/s-nail-14.9.19/src/mx/cmd-csop.c:98:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char csc_iencbuf[2+1/* BASE# prefix*/ + su_IENC_BUFFER_SIZE + 1];
data/s-nail-14.9.19/src/mx/cmd-csop.c:103:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char css_name[14];
data/s-nail-14.9.19/src/mx/cmd-edit.c:75:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char prompt[64];
data/s-nail-14.9.19/src/mx/cmd-head.c:88:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char attrlist[attrlen +1], *cp;
data/s-nail-14.9.19/src/mx/cmd-head.c:101:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char const bsdattr[attrlen +1] = "NU  *HMFAT+-$~";
data/s-nail-14.9.19/src/mx/cmd-head.c:105:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char const bsdattr[attrlen +1] = "NU  *HMFAT+-$~";
data/s-nail-14.9.19/src/mx/cmd-head.c:111:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char const pattr[attrlen +1]   = "NUROSPMFAT+-$~";
data/s-nail-14.9.19/src/mx/cmd-head.c:132:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[16], cbuf[8], *cp, *subjline;
data/s-nail-14.9.19/src/mx/cmd-head.c:642:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char mbb[MB_LEN_MAX];
data/s-nail-14.9.19/src/mx/cmd-msg.c:671:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cbuf[su_IENC_BUFFER_SIZE], sep1, sep2;
data/s-nail-14.9.19/src/mx/cmd-vexpr.c:162:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char vc_iencbuf[2+1/* BASE# prefix*/ + su_IENC_BUFFER_SIZE + 1];
data/s-nail-14.9.19/src/mx/cmd-vexpr.c:167:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char vs_name[14];
data/s-nail-14.9.19/src/mx/cmd-vexpr.c:1030:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char binabuf[64 + 64 / 8 +1];
data/s-nail-14.9.19/src/mx/collect.c:83:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char coa_cmd[VFIELD_SIZE(0)];
data/s-nail-14.9.19/src/mx/collect.c:1092:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[128];
data/s-nail-14.9.19/src/mx/collect.c:1601:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[sizeof(su_UTF8_REPLACER)];
data/s-nail-14.9.19/src/mx/collect.c:1625:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char const *argv[2];
data/s-nail-14.9.19/src/mx/colour.c:72:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ctm_name[7];
data/s-nail-14.9.19/src/mx/colour.c:79:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const cmi_name[13];
data/s-nail-14.9.19/src/mx/colour.c:97:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cm_buf[VFIELD_SIZE(0)];
data/s-nail-14.9.19/src/mx/colour.c:107:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cg__reset_buf[Z_ALIGN(sizeof("\033[0m"))];
data/s-nail-14.9.19/src/mx/colour.c:126:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char const a_colour_ctx_prefixes[mx__COLOUR_CTX_MAX1][8] = {
data/s-nail-14.9.19/src/mx/colour.c:723:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char id_name[15];
data/s-nail-14.9.19/src/mx/colour.c:731:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *xspec, *cp, fg[3], cfg[2 + 2*sizeof("255")];
data/s-nail-14.9.19/src/mx/cred-auth.c:74:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char const at_user_name[16];
data/s-nail-14.9.19/src/mx/cred-auth.c:75:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char const at_name[13];
data/s-nail-14.9.19/src/mx/cred-md5.c:81:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char PADDING[64] = {
data/s-nail-14.9.19/src/mx/cred-md5.c:172:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
MD5Transform(mx_md5_type state[4], unsigned char block[64])
data/s-nail-14.9.19/src/mx/cred-md5.c:324:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
mx_md5_final(unsigned char digest[mx_MD5_DIGEST_SIZE], mx_md5_t *context)
data/s-nail-14.9.19/src/mx/cred-md5.c:326:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	bits[8];
data/s-nail-14.9.19/src/mx/cred-md5.c:378:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *
data/s-nail-14.9.19/src/mx/cred-md5.c:379:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
mx_md5_tohex(char hex[mx_MD5_TOHEX_SIZE], void const *vp){
data/s-nail-14.9.19/src/mx/cred-md5.c:402:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char digest[16], *cp;
data/s-nail-14.9.19/src/mx/cred-md5.c:457:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char k_ipad[65]; /* inner padding - key XORd with ipad */
data/s-nail-14.9.19/src/mx/cred-md5.c:458:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char k_opad[65]; /* outer padding - key XORd with opad */
data/s-nail-14.9.19/src/mx/cred-md5.c:459:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char tk[16];
data/s-nail-14.9.19/src/mx/cred-netrc.c:71:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char nrce_dat[VFIELD_SIZE(3)];
data/s-nail-14.9.19/src/mx/cred-netrc.c:79:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[a_NETRC_TOKEN_MAXLEN], boole *nl_last);
data/s-nail-14.9.19/src/mx/cred-netrc.c:100:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[a_NETRC_TOKEN_MAXLEN], machine[a_NETRC_TOKEN_MAXLEN],
data/s-nail-14.9.19/src/mx/cred-netrc.c:285:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
a_netrc__token(FILE *fi, char buffer[a_NETRC_TOKEN_MAXLEN], boole *nl_last){
data/s-nail-14.9.19/src/mx/cred-netrc.c:288:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tt_name[15];
data/s-nail-14.9.19/src/mx/file-dotlock.h:55:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char lname[PATH_MAX +1];
data/s-nail-14.9.19/src/mx/file-dotlock.h:115:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fd = open(lname,
data/s-nail-14.9.19/src/mx/file-locks.c:96:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char name[PATH_MAX +1];
data/s-nail-14.9.19/src/mx/file-locks.c:229:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char itoabuf[64];
data/s-nail-14.9.19/src/mx/file-locks.c:230:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char const *args[13];
data/s-nail-14.9.19/src/mx/file-streams.c:112:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char const mode[4];
data/s-nail-14.9.19/src/mx/file-streams.c:294:37:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if((cc.cc_fds[mx_CHILD_FD_OUT] = open(fsep->fse_realfile,
data/s-nail-14.9.19/src/mx/file-streams.c:345:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if((fd = open(file, osflags, 0666)) == -1)
data/s-nail-14.9.19/src/mx/file-streams.c:442:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         if((infd = open(file, (omode & W_OK ? O_RDWR : O_RDONLY))) != -1){
data/s-nail-14.9.19/src/mx/file-streams.c:620:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fd = open(cp_base, osoflags, 0600)) != -1){
data/s-nail-14.9.19/src/mx/file-streams.c:788:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mod[2];
data/s-nail-14.9.19/src/mx/filter-html.c:99:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fhh_dat[VFIELD_SIZE(0)];
data/s-nail-14.9.19/src/mx/filter-html.c:108:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const fht_tag[10]; /* Tag less < and > surroundings (TR, /TR, ..) */
data/s-nail-14.9.19/src/mx/filter-html.c:117:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fhe_cstr[5]; /* _EF_HAVE_CSTR (e.g., &hellip; -> ...) */
data/s-nail-14.9.19/src/mx/filter-html.c:118:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const fhe_ent[7]; /* Entity less & and ; surroundings */
data/s-nail-14.9.19/src/mx/filter-html.c:862:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char nobuf[32], c;
data/s-nail-14.9.19/src/mx/filter-html.c:1050:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char nobuf[32];
data/s-nail-14.9.19/src/mx/filter-html.c:1290:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[BUFFER_SIZE];
data/s-nail-14.9.19/src/mx/folder.c:536:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char cbuf[PATH_MAX];
data/s-nail-14.9.19/src/mx/folder.c:1205:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[2];
data/s-nail-14.9.19/src/mx/gen-okeys.h:1110:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const av_name[8 +1];
data/s-nail-14.9.19/src/mx/gen-okeys.h:1119:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const av_name[8 +1];
data/s-nail-14.9.19/src/mx/gen-okeys.h:1128:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const av_name[8 +1];
data/s-nail-14.9.19/src/mx/gen-okeys.h:1137:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const av_name[10 +1];
data/s-nail-14.9.19/src/mx/gen-okeys.h:1146:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const av_name[12 +1];
data/s-nail-14.9.19/src/mx/gen-okeys.h:1155:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const av_name[11 +1];
data/s-nail-14.9.19/src/mx/gen-okeys.h:1164:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const av_name[8 +1];
data/s-nail-14.9.19/src/mx/gen-okeys.h:1173:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const av_name[12 +1];
data/s-nail-14.9.19/src/mx/gen-okeys.h:1182:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const av_name[13 +1];
data/s-nail-14.9.19/src/mx/gen-okeys.h:1191:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const av_name[12 +1];
data/s-nail-14.9.19/src/mx/gen-okeys.h:1200:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const av_name[7 +1];
data/s-nail-14.9.19/src/mx/gen-okeys.h:1209:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const av_name[12 +1];
data/s-nail-14.9.19/src/mx/gen-okeys.h:1218:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const av_name[14 +1];
data/s-nail-14.9.19/src/mx/gen-okeys.h:1227:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const av_name[13 +1];
data/s-nail-14.9.19/src/mx/gen-okeys.h:1236:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const av_name[13 +1];
data/s-nail-14.9.19/src/mx/gen-okeys.h:1245:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const av_name[14 +1];
data/s-nail-14.9.19/src/mx/go.c:172:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char gii_dat[VFIELD_SIZE(6)];
data/s-nail-14.9.19/src/mx/go.c:192:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char gc_name[VFIELD_SIZE(0)]; /* Name of file or macro */
data/s-nail-14.9.19/src/mx/go.c:201:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char grc_name[VFIELD_SIZE(4)]; /* User input for identification purposes */
data/s-nail-14.9.19/src/mx/go.c:216:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char uf[VSTRUCT_SIZEOF(struct a_go_ctx, gc_name) +
data/s-nail-14.9.19/src/mx/go.c:264:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[32];
data/s-nail-14.9.19/src/mx/go.c:282:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char _wordbuf[2], *argv_stack[3], **argv_base, **argvp, *vput, *cp, *word;
data/s-nail-14.9.19/src/mx/go.c:1978:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char uf[VSTRUCT_SIZEOF(struct a_go_ctx, gc_name) +
data/s-nail-14.9.19/src/mx/header.c:101:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int a_header_extract_date_from_from_(char const *line, uz linelen,
data/s-nail-14.9.19/src/mx/header.c:102:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char datebuf[n_FROM_DATEBUF]);
data/s-nail-14.9.19/src/mx/header.c:124:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char date[n_FROM_DATEBUF]);
data/s-nail-14.9.19/src/mx/header.c:153:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
a_header_extract_date_from_from_(char const *line, uz linelen,
data/s-nail-14.9.19/src/mx/header.c:154:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char datebuf[n_FROM_DATEBUF])
data/s-nail-14.9.19/src/mx/header.c:401:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
a_header_parse_from_(struct message *mp, char date[n_FROM_DATEBUF]){
data/s-nail-14.9.19/src/mx/header.c:1347:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char date[n_FROM_DATEBUF];
data/s-nail-14.9.19/src/mx/header.c:1808:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char eafd_name[15];
data/s-nail-14.9.19/src/mx/header.c:1899:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cbuf[sizeof "'\\U12340'"];
data/s-nail-14.9.19/src/mx/header.c:2645:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char  dat[7];
data/s-nail-14.9.19/src/mx/header.c:2857:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[3];
data/s-nail-14.9.19/src/mx/ignore.c:42:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char if_field[VFIELD_SIZE(0)]; /* Header field */
data/s-nail-14.9.19/src/mx/ignore.c:48:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char ir_input[VFIELD_SIZE(0)]; /* Regex input text (for showing it) */
data/s-nail-14.9.19/src/mx/ignore.c:64:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const ibm_name[8];
data/s-nail-14.9.19/src/mx/imap-search.c:834:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char ab[2 * SURROUNDING +1];
data/s-nail-14.9.19/src/mx/mailcap.c:433:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const *emsg, (*sfapp)[16];
data/s-nail-14.9.19/src/mx/mailcap.c:665:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char name[28];
data/s-nail-14.9.19/src/mx/mailcap.c:840:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char a_n[28];
data/s-nail-14.9.19/src/mx/maildir.c:729:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[4096], *fn, *tfn, *nfn;
data/s-nail-14.9.19/src/mx/main.c:76:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_weekday_names[7 + 1][4] = {
data/s-nail-14.9.19/src/mx/main.c:79:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_month_names[12 + 1][4] = {
data/s-nail-14.9.19/src/mx/main.c:83:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_uagent[sizeof VAL_UAGENT] = VAL_UAGENT;
data/s-nail-14.9.19/src/mx/main.c:85:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_error[sizeof n_ERROR] = N_(n_ERROR);
data/s-nail-14.9.19/src/mx/main.c:87:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_path_devnull[sizeof n_PATH_DEVNULL] = n_PATH_DEVNULL;
data/s-nail-14.9.19/src/mx/main.c:88:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_0[2] = "0";
data/s-nail-14.9.19/src/mx/main.c:89:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_1[2] = "1";
data/s-nail-14.9.19/src/mx/main.c:90:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_m1[3] = "-1";
data/s-nail-14.9.19/src/mx/main.c:91:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_em[2] = "!";
data/s-nail-14.9.19/src/mx/main.c:92:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_ns[2] = "#";
data/s-nail-14.9.19/src/mx/main.c:93:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_star[2] = "*";
data/s-nail-14.9.19/src/mx/main.c:94:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_hy[2] = "-";
data/s-nail-14.9.19/src/mx/main.c:95:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_qm[2] = "?";
data/s-nail-14.9.19/src/mx/main.c:96:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VL char const n_at[2] = "@";
data/s-nail-14.9.19/src/mx/main.c:456:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const *rv, *a[2];
data/s-nail-14.9.19/src/mx/main.c:585:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[7];
data/s-nail-14.9.19/src/mx/main.c:1204:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char const *a[2];
data/s-nail-14.9.19/src/mx/message.c:113:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msl__smallstrbuf[4];
data/s-nail-14.9.19/src/mx/message.c:1159:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char lastscan[128];
data/s-nail-14.9.19/src/mx/mime-param.c:219:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char nobuf[32], *eptr, *rv = NULL, c;
data/s-nail-14.9.19/src/mx/mime-param.c:543:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[MIN(MIME_LINELEN_MAX >> 1, MIME_LINELEN * 2)],
data/s-nail-14.9.19/src/mx/mime-param.c:696:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char nobuf[16];
data/s-nail-14.9.19/src/mx/mime-type.c:189:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const *srcs_arr[10], *ccp, **srcs;
data/s-nail-14.9.19/src/mx/mime-type.c:604:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char f_buf[a_F_SIZEOF], *f_p = f_buf;
data/s-nail-14.9.19/src/mx/mime-type.c:1388:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char mt_name[12];
data/s-nail-14.9.19/src/mx/mime.c:814:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const *sarr[3];
data/s-nail-14.9.19/src/mx/mime.c:920:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
charset_iter_recurse(char *outer_storage[2]) /* TODO LEGACY FUN, REMOVE */
data/s-nail-14.9.19/src/mx/mime.c:929:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
charset_iter_restore(char *outer_storage[2]) /* TODO LEGACY FUN, REMOVE */
data/s-nail-14.9.19/src/mx/net-pop3.c:288:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char digest[mx_MD5_DIGEST_SIZE];
data/s-nail-14.9.19/src/mx/net-pop3.c:289:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char hex[mx_MD5_TOHEX_SIZE], *cp;
data/s-nail-14.9.19/src/mx/net-pop3.c:652:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE];
data/s-nail-14.9.19/src/mx/net-pop3.c:734:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE], *line, *lp;
data/s-nail-14.9.19/src/mx/net-pop3.c:898:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE];
data/s-nail-14.9.19/src/mx/net-smtp.c:192:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE]; /* TODO n_string++ */
data/s-nail-14.9.19/src/mx/net-socket.c:122:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char hbuf[NI_MAXHOST];
data/s-nail-14.9.19/src/mx/net-socket.c:725:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char o[512];
data/s-nail-14.9.19/src/mx/net-socket.c:782:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char o[512];
data/s-nail-14.9.19/src/mx/net-socket.c:802:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char o[512];
data/s-nail-14.9.19/src/mx/obs-imap-cache.c:150:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64], *cp;
data/s-nail-14.9.19/src/mx/obs-imap-cache.c:166:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char b, iob[32768];
data/s-nail-14.9.19/src/mx/obs-imap-cache.c:288:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char iob[32768], *name, ob;
data/s-nail-14.9.19/src/mx/obs-imap-cache.c:595:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[30];
data/s-nail-14.9.19/src/mx/obs-imap.c:1146:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE];
data/s-nail-14.9.19/src/mx/obs-imap.c:1369:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char o[LINESIZE];
data/s-nail-14.9.19/src/mx/obs-imap.c:1397:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE];
data/s-nail-14.9.19/src/mx/obs-imap.c:1474:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE], *cp;
data/s-nail-14.9.19/src/mx/obs-imap.c:1500:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE];
data/s-nail-14.9.19/src/mx/obs-imap.c:1680:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE];
data/s-nail-14.9.19/src/mx/obs-imap.c:1716:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE];
data/s-nail-14.9.19/src/mx/obs-imap.c:2284:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE];
data/s-nail-14.9.19/src/mx/obs-imap.c:2401:18:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      expected = atol(&cp[1]);
data/s-nail-14.9.19/src/mx/obs-imap.c:2490:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE];
data/s-nail-14.9.19/src/mx/obs-imap.c:2524:18:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      expected = atol(&cp[1]);
data/s-nail-14.9.19/src/mx/obs-imap.c:2629:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE];
data/s-nail-14.9.19/src/mx/obs-imap.c:2687:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE];
data/s-nail-14.9.19/src/mx/obs-imap.c:2865:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE];
data/s-nail-14.9.19/src/mx/obs-imap.c:2942:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char ts[20];
data/s-nail-14.9.19/src/mx/obs-imap.c:3018:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE];
data/s-nail-14.9.19/src/mx/obs-imap.c:3148:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE], *buf;
data/s-nail-14.9.19/src/mx/obs-imap.c:3436:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE], *cp;
data/s-nail-14.9.19/src/mx/obs-imap.c:3486:55:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   depth = (cp = ok_vlook(imap_list_depth)) != NULL ? atoi(cp) : 2;
data/s-nail-14.9.19/src/mx/obs-imap.c:3595:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE];
data/s-nail-14.9.19/src/mx/obs-imap.c:3899:12:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   xsize = atol(&cp[1]) + 2;
data/s-nail-14.9.19/src/mx/obs-imap.c:4200:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char o[LINESIZE], *newname, *buf, *bp, *cp, iob[4096];
data/s-nail-14.9.19/src/mx/obs-imap.c:4248:19:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
         octets = atol(&cp[1]) + 2;
data/s-nail-14.9.19/src/mx/obs-imap.c:4529:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[3];
data/s-nail-14.9.19/src/mx/obs-imap.c:4580:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char s[40];
data/s-nail-14.9.19/src/mx/path.c:125:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ((cw->cw_fd = open(".", O_RDONLY)) == -1)
data/s-nail-14.9.19/src/mx/quit.c:77:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _mboxname[PATH_MAX];  /* Name of mbox */
data/s-nail-14.9.19/src/mx/quit.c:285:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fd = open(mailname, (O_WRONLY | O_CREAT | n_O_NOXY_BITS | O_TRUNC),
data/s-nail-14.9.19/src/mx/quit.c:487:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fd = open(mailname, (O_WRONLY | O_CREAT | n_O_NOXY_BITS | O_TRUNC),
data/s-nail-14.9.19/src/mx/quit.c:595:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((c = open(mbox, (O_WRONLY | O_CREAT | mx_O_NOXY_BITS | O_TRUNC), 0666)
data/s-nail-14.9.19/src/mx/random.c:118:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if((u.fd = open("/dev/urandom", O_RDONLY)) != -1){
data/s-nail-14.9.19/src/mx/random.c:293:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         union {u32 i4; char c[4];} r;
data/s-nail-14.9.19/src/mx/random.c:309:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         union {u32 i4; char c[4];} r;
data/s-nail-14.9.19/src/mx/send.c:122:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[64];
data/s-nail-14.9.19/src/mx/send.c:278:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const *env_addon[9 +8/*v15*/], *cp, *sh;
data/s-nail-14.9.19/src/mx/send.c:1564:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char statout[3], *cp = statout;
data/s-nail-14.9.19/src/mx/send.c:1585:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char xstatout[4];
data/s-nail-14.9.19/src/mx/sendout.c:425:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *charset_iter_orig[2];
data/s-nail-14.9.19/src/mx/shexp.c:879:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char itoa[32];
data/s-nail-14.9.19/src/mx/shexp.c:918:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char itoa[32];
data/s-nail-14.9.19/src/mx/shexp.c:1197:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char c2, c, quotec, utf[8];
data/s-nail-14.9.19/src/mx/shexp.c:1668:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           char itoa[32];
data/s-nail-14.9.19/src/mx/sigs.c:463:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char pathbuf[PATH_MAX], s2ibuf[32], *cp;
data/s-nail-14.9.19/src/mx/sigs.c:494:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if((fd = open(pathbuf, O_WRONLY | O_CREAT | O_EXCL, 0666)) == -1)
data/s-nail-14.9.19/src/mx/spam.c:70:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const *cf_env[4];
data/s-nail-14.9.19/src/mx/spam.c:84:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const *c_cmd_arr[9];
data/s-nail-14.9.19/src/mx/termcap.c:128:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tee_name[VFIELD_SIZE(0)];
data/s-nail-14.9.19/src/mx/termcap.c:136:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tg_lib_buf[a_TERMCAP_ENTRYSIZE_MAX];
data/s-nail-14.9.19/src/mx/termcap.c:566:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf_base[a_TERMCAP_ENTRYSIZE_MAX], *buf = &buf_base[0];
data/s-nail-14.9.19/src/mx/thread.c:681:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *_args[2], *cp, **args = vp;
data/s-nail-14.9.19/src/mx/tls.c:63:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const tv_name[8];
data/s-nail-14.9.19/src/mx/tls.c:124:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char ml_buf[VFIELD_SIZE(0)];
data/s-nail-14.9.19/src/mx/tty-mle.c:256:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tbc__buf[VFIELD_SIZE(0)];
data/s-nail-14.9.19/src/mx/tty-mle.c:264:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tbbt_exp[12]; /* String or [0]=NUL/[1]=BIND_FUN_REDUCE() */
data/s-nail-14.9.19/src/mx/tty-mle.c:301:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tc_cbuf[MB_LEN_MAX * 2]; /* .. plus reset shift sequence */
data/s-nail-14.9.19/src/mx/tty-mle.c:318:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tg_bind_shcut_cancel[n__GO_INPUT_CTX_MAX1][a_TTY_SHCUT_MAX];
data/s-nail-14.9.19/src/mx/tty-mle.c:319:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tg_bind_shcut_prompt_char[n__GO_INPUT_CTX_MAX1][a_TTY_SHCUT_MAX];
data/s-nail-14.9.19/src/mx/tty-mle.c:338:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char th_dat[VFIELD_SIZE(3)];
data/s-nail-14.9.19/src/mx/tty-mle.c:346:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const ticm_name[12]; /* Name of `bind' context */
data/s-nail-14.9.19/src/mx/tty-mle.c:360:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char (*tl_bind_shcut_cancel)[a_TTY_SHCUT_MAX]; /* Special _CANCEL control */
data/s-nail-14.9.19/src/mx/tty-mle.c:361:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char (*tl_bind_shcut_prompt_char)[a_TTY_SHCUT_MAX]; /* ..for _PROMPT_CHAR */
data/s-nail-14.9.19/src/mx/tty-mle.c:717:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if((fp = fopen(hfname, "r")) == NIL){
data/s-nail-14.9.19/src/mx/tty-mle.c:837:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if((f = fopen(v, "w")) == NIL){ /* TODO temporary + rename?! */
data/s-nail-14.9.19/src/mx/tty-mle.c:1166:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[16];
data/s-nail-14.9.19/src/mx/tty-mle.c:1555:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char wbuf[8]; /* XXX magic */
data/s-nail-14.9.19/src/mx/tty-mle.c:1591:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char posbuf[5], *pos = posbuf;
data/s-nail-14.9.19/src/mx/tty-mle.c:2798:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cbuf_base[MB_LEN_MAX * 2], *cbuf, *cbufp;
data/s-nail-14.9.19/src/mx/tty-mle.c:3582:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char capname[a_TTY_BIND_CAPNAME_MAX +1];
data/s-nail-14.9.19/src/mx/tty-mle.c:3674:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char cbuf[8], c;
data/s-nail-14.9.19/src/mx/tty-mle.c:4022:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[8];
data/s-nail-14.9.19/src/mx/ui-str.c:453:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char mbb[MB_LEN_MAX + 1];
data/s-nail-14.9.19/src/mx/url.c:265:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char const name[14];
data/s-nail-14.9.19/src/mx/url.c:266:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char const port[7];
data/s-nail-14.9.19/src/mx/xtls.c:209:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const  sm_name[8];
data/s-nail-14.9.19/src/mx/xtls.c:210:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const  sm_map[16];
data/s-nail-14.9.19/src/mx/xtls.c:214:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const xp_name[8];
data/s-nail-14.9.19/src/mx/xtls.c:225:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const xc_name[8];
data/s-nail-14.9.19/src/mx/xtls.c:230:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const xd_name[16];
data/s-nail-14.9.19/src/mx/xtls.c:235:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char const xxvf_name[20];
data/s-nail-14.9.19/src/mx/xtls.c:456:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char b64buf[a_XTLS_RAND_ENTROPY * 5 +1], *randfile;
data/s-nail-14.9.19/src/mx/xtls.c:668:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char data[256];
data/s-nail-14.9.19/src/mx/xtls.c:1319:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char data[256];
data/s-nail-14.9.19/src/mx/xtls.c:1364:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char data[LINESIZE], *sender, *to, *cc, *cnttype;
data/s-nail-14.9.19/src/mx/xtls.c:2020:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char fpmdhexbuf[EVP_MAX_MD_SIZE * 3], *cp;
data/s-nail-14.9.19/src/mx/xtls.c:2021:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         unsigned char fpmdbuf[EVP_MAX_MD_SIZE], *ucp;
data/s-nail-14.9.19/src/ps-dotlock/main.c:106:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char hostbuf[64];
data/s-nail-14.9.19/src/su/.main.cc:35:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static void a__cs_dict_case(cs_dict<char const*> *cdp, char const *k[3]);
data/s-nail-14.9.19/src/su/.main.cc:94:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char const *k[3];
data/s-nail-14.9.19/src/su/.main.cc:104:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char const *k[3];
data/s-nail-14.9.19/src/su/.main.cc:116:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[ienc::buffer_size], *cp;
data/s-nail-14.9.19/src/su/.main.cc:219:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
a__cs_dict_case(cs_dict<char const*> *cdp, char const *k[3]){
data/s-nail-14.9.19/src/su/.main.cc:443:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[ienc::buffer_size];
data/s-nail-14.9.19/src/su/.main.cc:556:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[utf8::buffer_size];
data/s-nail-14.9.19/src/su/avopt.c:351:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char s_so[8], s_lo[128];
data/s-nail-14.9.19/src/su/core-code.c:104:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[su_IENC_BUFFER_SIZE];
data/s-nail-14.9.19/src/su/core-code.c:151:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[80], c;
data/s-nail-14.9.19/src/su/icodec-enc.c:39:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char const a_icoe_upper[36 +1] = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ";
data/s-nail-14.9.19/src/su/icodec-enc.c:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char const a_icoe_lower[36 +1] = "0123456789abcdefghijklmnopqrstuvwxyz";
data/s-nail-14.9.19/src/su/icodec-enc.c:42:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *
data/s-nail-14.9.19/src/su/icodec-enc.c:43:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
su_ienc(char cbuf[su_IENC_BUFFER_SIZE], u64 value, u8 base, u32 ienc_mode){
data/s-nail-14.9.19/src/su/mem-bag.c:82:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mbab_buf[VFIELD_SIZE(0)]; /* MEMBAG_HULL: void*[] */
data/s-nail-14.9.19/src/su/mem-bag.c:87:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mbah_buf[VFIELD_SIZE(0)];   /* MEMBAG_HULL: void* to real chunk */
data/s-nail-14.9.19/src/su/mem-bag.c:95:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mblp_buf[VFIELD_SIZE(0)];   /* su__mem_bag_lofi_chunk* */
data/s-nail-14.9.19/src/su/mem-bag.c:102:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mblc_buf[VFIELD_SIZE(0)];
data/s-nail-14.9.19/src/su/utf.c:28:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char const su_utf8_replacer[sizeof su_UTF8_REPLACER] = su_UTF8_REPLACER;
data/s-nail-14.9.19/src/su/x-assoc-map.h:646:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[50], *cp;
data/s-nail-14.9.19/src/su/x-mem-tools.h:60:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(vp, src, len);
data/s-nail-14.9.19/include/mx/nailfuns.h:66:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
# undef getc
data/s-nail-14.9.19/include/mx/nailfuns.h:67:10:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
# define getc(c) getc_unlocked(c)
data/s-nail-14.9.19/src/mx/accmacvar.c:1196:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
            umask((mode_t)uib);
data/s-nail-14.9.19/src/mx/auxlily.c:203:22:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         while ((c = getc(fp)) != EOF)
data/s-nail-14.9.19/src/mx/auxlily.c:225:16:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   while ((c = getc(fp)) != EOF)
data/s-nail-14.9.19/src/mx/child.c:411:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         r = read(S(int,ccp->cc__cpipe[0]), ebuf, sizeof ebuf);
data/s-nail-14.9.19/src/mx/cmd-edit.c:105:22:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         while ((c = getc(fp)) != EOF) {
data/s-nail-14.9.19/src/mx/cmd-edit.c:190:36:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         while(--size >= 0 && (t = getc(fp)) != EOF)
data/s-nail-14.9.19/src/mx/cmd-edit.c:194:21:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         while((t = getc(fp)) != EOF)
data/s-nail-14.9.19/src/mx/cmd-misc.c:362:33:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            for(; l > 0 && (c = getc(fp)) != EOF; --l)
data/s-nail-14.9.19/src/mx/cmd-msg.c:316:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         if((c = getc(iobuf)) == EOF || putc(c, pbuf) == EOF){
data/s-nail-14.9.19/src/mx/cmd-msg.c:333:21:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if((c = getc(iobuf)) == EOF){
data/s-nail-14.9.19/src/mx/collect.c:424:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while((c = getc(ibuf)) != EOF){ /* XXX bytewise, yuck! */
data/s-nail-14.9.19/src/mx/collect.c:525:16:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   while ((c = getc(fp)) != EOF) {
data/s-nail-14.9.19/src/mx/collect.c:791:16:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   while ((c = getc(fp)) != EOF) /* XXX bytewise, yuck! */
data/s-nail-14.9.19/src/mx/collect.c:1358:30:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  while((c = getc(_coll_fp)) != EOF) /* XXX bytewise, yuck! */
data/s-nail-14.9.19/src/mx/cred-netrc.c:188:32:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
               for(i = 0; (c = getc(fi)) != EOF;)
data/s-nail-14.9.19/src/mx/cred-netrc.c:313:36:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      for(seen_nl = *nl_last; (c = getc(fi)) != EOF && su_cs_is_white(c);)
data/s-nail-14.9.19/src/mx/cred-netrc.c:320:21:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         while((c = getc(fi)) != EOF && c != '\n')
data/s-nail-14.9.19/src/mx/cred-netrc.c:334:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while((c = getc(fi)) != EOF && c != quotec){
data/s-nail-14.9.19/src/mx/cred-netrc.c:337:21:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if((c = getc(fi)) == EOF)
data/s-nail-14.9.19/src/mx/cred-netrc.c:347:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while((c = getc(fi)) != EOF && !su_cs_is_white(c)){
data/s-nail-14.9.19/src/mx/cred-netrc.c:349:31:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         if(c == '\\' && (c = getc(fi)) == EOF)
data/s-nail-14.9.19/src/mx/file-locks.c:271:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      read(STDIN_FILENO, &fdls, sizeof fdls);
data/s-nail-14.9.19/src/mx/file-locks.c:426:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      u.r = read(S(int,cpipe[0]), &fdls, sizeof fdls);
data/s-nail-14.9.19/src/mx/file-streams.c:1111:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(fp);
data/s-nail-14.9.19/src/mx/file-streams.c:1239:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         size = read(0, *linebuf + n, *linesize - n - 1);
data/s-nail-14.9.19/src/mx/go.c:481:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         i = strlen(alias_exp);
data/s-nail-14.9.19/src/mx/header.c:1156:21:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         ungetc(c = getc(f), f);
data/s-nail-14.9.19/src/mx/header.c:1604:19:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         if ((c = getc(fp)) != '\n' && c != EOF)
data/s-nail-14.9.19/src/mx/header.c:2615:16:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
               strncpy(namebuf, cp, namesize);
data/s-nail-14.9.19/src/mx/header.c:2619:16:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
               strncpy(cp2, cp, P2UZ(namebuf + namesize - cp2));
data/s-nail-14.9.19/src/mx/main.c:1164:19:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
   (void)ok_vlook(umask);
data/s-nail-14.9.19/src/mx/mime-parse.c:209:24:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   while (cnt && ((c = getc(ibuf)) != EOF)) {
data/s-nail-14.9.19/src/mx/mime-type.c:762:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if((c = getc(ibuf)) == EOF || (c == '\n' && lc == '\n'))
data/s-nail-14.9.19/src/mx/mime-type.c:778:32:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = (--cnt == 0) ? EOF : getc(ibuf);
data/s-nail-14.9.19/src/mx/net-socket.c:534:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if(read(sop->s_fd, pbuf, 2) != 2)
data/s-nail-14.9.19/src/mx/net-socket.c:567:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if((i = read(sop->s_fd, pbuf, 4)) != 4)
data/s-nail-14.9.19/src/mx/net-socket.c:598:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if(read(sop->s_fd, pbuf, i) != (sz)i)
data/s-nail-14.9.19/src/mx/net-socket.c:602:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         if(read(sop->s_fd, pbuf, i) != (sz)i)
data/s-nail-14.9.19/src/mx/net-socket.c:799:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            sop->s_rsz = read(sop->s_fd, sop->s_rbuf, sizeof sop->s_rbuf);
data/s-nail-14.9.19/src/mx/quit.c:146:31:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      for(lastnl = FAL0; (c = getc(res)) != EOF && putc(c, obuf) != EOF;)
data/s-nail-14.9.19/src/mx/quit.c:222:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while((c = getc(ibuf)) != EOF){ /* xxx bytewise??? */
data/s-nail-14.9.19/src/mx/quit.c:264:31:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      for(lastnl = FAL0; (c = getc(ibuf)) != EOF && putc(c, obuf) != EOF;)
data/s-nail-14.9.19/src/mx/quit.c:419:31:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      for(lastnl = FAL0; (c = getc(fbuf)) != EOF && putc(c, rbuf) != EOF;)
data/s-nail-14.9.19/src/mx/quit.c:476:19:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while ((c = getc(rbuf)) != EOF)
data/s-nail-14.9.19/src/mx/quit.c:580:35:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         for (lastnl = FAL0; (c = getc(abuf)) != EOF && putc(c, obuf) != EOF;)
data/s-nail-14.9.19/src/mx/quit.c:639:31:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      for(lastnl = FAL0; (c = getc(ibuf)) != EOF && putc(c, obuf) != EOF;)
data/s-nail-14.9.19/src/mx/random.c:121:44:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      ok = (sizeof(a_rand->a._dat) == S(uz,read(u.fd,
data/s-nail-14.9.19/src/mx/send.c:536:26:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while (cnt && (c = getc(ibuf)) != EOF) {
data/s-nail-14.9.19/src/mx/send.c:1716:30:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while (cnt > 0 && (c = getc(ibuf)) != EOF) {
data/s-nail-14.9.19/src/mx/send.c:1735:30:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while (cnt > 0 && (c = getc(ibuf)) != EOF) {
data/s-nail-14.9.19/src/mx/sendout.c:1031:28:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         while(i = c, (c = getc(fo)) != EOF)
data/s-nail-14.9.19/src/mx/sendout.c:1121:21:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         while((c = getc(fp)) != EOF)
data/s-nail-14.9.19/src/mx/sendout.c:3067:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while((c = getc(fp)) != EOF && c != '\n')
data/s-nail-14.9.19/src/mx/spam.c:740:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         sz i = read(S(int,c2p[0]), vcp->vc_buffer, BUFFER_SIZE - 1);
data/s-nail-14.9.19/src/mx/tls.c:173:21:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if((c = getc(ip)) == EOF || ungetc(c, ip) == EOF)
data/s-nail-14.9.19/src/mx/tls.c:237:16:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   while ((c = getc(hp)) != EOF) {
data/s-nail-14.9.19/src/mx/tls.c:249:16:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   while ((c = getc(bp)) != EOF)
data/s-nail-14.9.19/src/mx/tls.c:264:16:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   while ((c = getc(tsp)) != EOF) {
data/s-nail-14.9.19/src/mx/tls.c:266:22:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         while ((c = getc(tsp)) != EOF && c != '\n');
data/s-nail-14.9.19/src/mx/tls.c:304:16:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   while ((c = getc(hp)) != EOF) {
data/s-nail-14.9.19/src/mx/tls.c:322:16:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   while ((c = getc(yp)) != EOF) {
data/s-nail-14.9.19/src/mx/tls.c:324:22:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         while ((c = getc(yp)) != EOF && c != '\n');
data/s-nail-14.9.19/src/mx/tty-mle.c:1198:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if(read(STDIN_FILENO, &buf[i], 1) != 1){ /* xxx tty_fd */
data/s-nail-14.9.19/src/mx/tty-mle.c:2920:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            while((rv = read(STDIN_FILENO, cbufp, 1)) == -1){
data/s-nail-14.9.19/src/mx/xtls.c:1421:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(ip);
data/s-nail-14.9.19/src/mx/xtls.c:2625:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(ip);
data/s-nail-14.9.19/src/ps-dotlock/main.c:162:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      i = strlen(fdi.fdi_file_name);
data/s-nail-14.9.19/src/ps-dotlock/main.c:230:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      read(STDIN_FILENO, &fdls, sizeof fdls);
data/s-nail-14.9.19/src/su/icodec-dec.c:235:11:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
      u64 umask;
data/s-nail-14.9.19/src/su/icodec-dec.c:245:10:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
         umask >>= 1;
data/s-nail-14.9.19/src/su/icodec-dec.c:247:17:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
      if(res & ~umask){
data/s-nail-14.9.19/src/su/icodec-dec.c:251:22:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
               res = umask << 1;
data/s-nail-14.9.19/src/su/icodec-dec.c:252:24:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
               res &= ~umask;
data/s-nail-14.9.19/src/su/icodec-dec.c:258:19:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
            res = umask;

ANALYSIS SUMMARY:

Hits = 452
Lines analyzed = 104928 in approximately 3.61 seconds (29072 lines/second)
Physical Source Lines of Code (SLOC) = 79337
Hits@level = [0] 328 [1]  76 [2] 315 [3]  10 [4]  50 [5]   1
Hits@level+ = [0+] 780 [1+] 452 [2+] 376 [3+]  61 [4+]  51 [5+]   1
Hits/KSLOC@level+ = [0+] 9.83148 [1+] 5.69722 [2+] 4.73928 [3+] 0.768872 [4+] 0.642827 [5+] 0.0126045
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.