Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/scite-4.4.5/scintilla/cocoa/QuartzTextStyleAttribute.h
Examining data/scite-4.4.5/scintilla/cocoa/QuartzTextLayout.h
Examining data/scite-4.4.5/scintilla/cocoa/PlatCocoa.h
Examining data/scite-4.4.5/scintilla/cocoa/QuartzTextStyle.h
Examining data/scite-4.4.5/scintilla/cocoa/InfoBarCommunicator.h
Examining data/scite-4.4.5/scintilla/cocoa/ScintillaTest/AppController.h
Examining data/scite-4.4.5/scintilla/cocoa/ScintillaView.h
Examining data/scite-4.4.5/scintilla/cocoa/InfoBar.h
Examining data/scite-4.4.5/scintilla/cocoa/ScintillaCocoa.h
Examining data/scite-4.4.5/scintilla/gtk/ScintillaGTK.cxx
Examining data/scite-4.4.5/scintilla/gtk/PlatGTK.cxx
Examining data/scite-4.4.5/scintilla/gtk/ScintillaGTK.h
Examining data/scite-4.4.5/scintilla/gtk/scintilla-marshal.c
Examining data/scite-4.4.5/scintilla/gtk/scintilla-marshal.h
Examining data/scite-4.4.5/scintilla/gtk/ScintillaGTKAccessible.h
Examining data/scite-4.4.5/scintilla/gtk/ScintillaGTKAccessible.cxx
Examining data/scite-4.4.5/scintilla/gtk/Converter.h
Examining data/scite-4.4.5/scintilla/include/SciLexer.h
Examining data/scite-4.4.5/scintilla/include/Sci_Position.h
Examining data/scite-4.4.5/scintilla/include/ILoader.h
Examining data/scite-4.4.5/scintilla/include/Platform.h
Examining data/scite-4.4.5/scintilla/include/ScintillaWidget.h
Examining data/scite-4.4.5/scintilla/include/Scintilla.h
Examining data/scite-4.4.5/scintilla/include/ILexer.h
Examining data/scite-4.4.5/scintilla/lexers/LexPLM.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexAda.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexPOV.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexMSSQL.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexBash.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexMetapost.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexPowerShell.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexLua.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexPascal.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexPO.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexTACL.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexASY.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexHaskell.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexHex.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexTAL.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexPowerPro.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexVisualProlog.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexDMIS.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexHTML.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexECL.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexAVE.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexCoffeeScript.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexLaTeX.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexAsn1.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexRuby.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexRebol.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexDiff.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexGui4Cli.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexPython.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexA68k.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexFortran.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexErrorList.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexSmalltalk.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexRaku.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexCSS.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexCIL.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexDMAP.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexNull.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexInno.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexProgress.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexErlang.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexBaan.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexLisp.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexD.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexSTTXT.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexJSON.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexHollywood.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexMPT.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexSpecman.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexForth.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexTADS3.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexNimrod.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexMMIXAL.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexRegistry.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexConf.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexMatlab.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexCmake.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexMake.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexCrontab.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexAU3.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexNim.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexBatch.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexVHDL.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexMarkdown.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexTCMD.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexScriptol.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexSpice.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexVerilog.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexCOBOL.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexAbaqus.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexTxt2tags.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexSQL.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexPS.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexBibTeX.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexCLW.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexKix.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexSAS.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexVB.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexSorcus.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexGAP.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexAVS.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexCaml.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexMagik.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexEiffel.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexRust.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexAsm.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexOScript.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexCsound.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexMySQL.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexNsis.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexStata.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexBasic.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexTeX.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexFlagship.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexProps.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexSML.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexPB.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexEDIFACT.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexTCL.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexEScript.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexModula.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexLout.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexBullant.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexMaxima.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexDataflex.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexIndent.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexAPDL.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexOpal.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexYAML.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexKVIrc.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexPerl.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexCPP.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexX12.cxx
Examining data/scite-4.4.5/scintilla/lexers/LexR.cxx
Examining data/scite-4.4.5/scintilla/lexilla/src/Lexilla.h
Examining data/scite-4.4.5/scintilla/lexilla/src/Lexilla.cxx
Examining data/scite-4.4.5/scintilla/lexilla/test/LexillaAccess.h
Examining data/scite-4.4.5/scintilla/lexilla/test/LexillaAccess.cxx
Examining data/scite-4.4.5/scintilla/lexilla/test/examples/cpp/x.cxx
Examining data/scite-4.4.5/scintilla/lexilla/test/TestDocument.h
Examining data/scite-4.4.5/scintilla/lexilla/test/TestLexers.cxx
Examining data/scite-4.4.5/scintilla/lexilla/test/TestDocument.cxx
Examining data/scite-4.4.5/scintilla/lexlib/LexerSimple.cxx
Examining data/scite-4.4.5/scintilla/lexlib/LexerSimple.h
Examining data/scite-4.4.5/scintilla/lexlib/CharacterSet.cxx
Examining data/scite-4.4.5/scintilla/lexlib/CharacterCategory.cxx
Examining data/scite-4.4.5/scintilla/lexlib/LexerModule.cxx
Examining data/scite-4.4.5/scintilla/lexlib/Accessor.cxx
Examining data/scite-4.4.5/scintilla/lexlib/LexerBase.h
Examining data/scite-4.4.5/scintilla/lexlib/SubStyles.h
Examining data/scite-4.4.5/scintilla/lexlib/WordList.cxx
Examining data/scite-4.4.5/scintilla/lexlib/PropSetSimple.cxx
Examining data/scite-4.4.5/scintilla/lexlib/LexerModule.h
Examining data/scite-4.4.5/scintilla/lexlib/DefaultLexer.h
Examining data/scite-4.4.5/scintilla/lexlib/CharacterSet.h
Examining data/scite-4.4.5/scintilla/lexlib/LexerNoExceptions.h
Examining data/scite-4.4.5/scintilla/lexlib/SparseState.h
Examining data/scite-4.4.5/scintilla/lexlib/LexerBase.cxx
Examining data/scite-4.4.5/scintilla/lexlib/PropSetSimple.h
Examining data/scite-4.4.5/scintilla/lexlib/StyleContext.h
Examining data/scite-4.4.5/scintilla/lexlib/WordList.h
Examining data/scite-4.4.5/scintilla/lexlib/Accessor.h
Examining data/scite-4.4.5/scintilla/lexlib/LexAccessor.h
Examining data/scite-4.4.5/scintilla/lexlib/CatalogueModules.h
Examining data/scite-4.4.5/scintilla/lexlib/OptionSet.h
Examining data/scite-4.4.5/scintilla/lexlib/StringCopy.h
Examining data/scite-4.4.5/scintilla/lexlib/DefaultLexer.cxx
Examining data/scite-4.4.5/scintilla/lexlib/CharacterCategory.h
Examining data/scite-4.4.5/scintilla/lexlib/LexerNoExceptions.cxx
Examining data/scite-4.4.5/scintilla/lexlib/StyleContext.cxx
Examining data/scite-4.4.5/scintilla/qt/ScintillaEdit/ScintillaDocument.h
Examining data/scite-4.4.5/scintilla/qt/ScintillaEdit/ScintillaDocument.cpp
Examining data/scite-4.4.5/scintilla/qt/ScintillaEditPy/global.h
Examining data/scite-4.4.5/scintilla/qt/ScintillaEditPy/moc_ScintillaEdit.cpp
Examining data/scite-4.4.5/scintilla/qt/ScintillaEditBase/ScintillaQt.cpp
Examining data/scite-4.4.5/scintilla/qt/ScintillaEditBase/PlatQt.cpp
Examining data/scite-4.4.5/scintilla/qt/ScintillaEditBase/PlatQt.h
Examining data/scite-4.4.5/scintilla/qt/ScintillaEditBase/ScintillaEditBase.cpp
Examining data/scite-4.4.5/scintilla/qt/ScintillaEditBase/ScintillaEditBase.h
Examining data/scite-4.4.5/scintilla/qt/ScintillaEditBase/ScintillaQt.h
Examining data/scite-4.4.5/scintilla/src/AutoComplete.cxx
Examining data/scite-4.4.5/scintilla/src/FontQuality.h
Examining data/scite-4.4.5/scintilla/src/MarginView.cxx
Examining data/scite-4.4.5/scintilla/src/PositionCache.cxx
Examining data/scite-4.4.5/scintilla/src/CharClassify.cxx
Examining data/scite-4.4.5/scintilla/src/Catalogue.h
Examining data/scite-4.4.5/scintilla/src/ScintillaBase.cxx
Examining data/scite-4.4.5/scintilla/src/UniConversion.h
Examining data/scite-4.4.5/scintilla/src/XPM.h
Examining data/scite-4.4.5/scintilla/src/Partitioning.h
Examining data/scite-4.4.5/scintilla/src/CaseConvert.h
Examining data/scite-4.4.5/scintilla/src/Editor.cxx
Examining data/scite-4.4.5/scintilla/src/LineMarker.cxx
Examining data/scite-4.4.5/scintilla/src/ViewStyle.h
Examining data/scite-4.4.5/scintilla/src/CharClassify.h
Examining data/scite-4.4.5/scintilla/src/CaseFolder.cxx
Examining data/scite-4.4.5/scintilla/src/IntegerRectangle.h
Examining data/scite-4.4.5/scintilla/src/EditModel.h
Examining data/scite-4.4.5/scintilla/src/EditView.cxx
Examining data/scite-4.4.5/scintilla/src/UniqueString.h
Examining data/scite-4.4.5/scintilla/src/ScintillaBase.h
Examining data/scite-4.4.5/scintilla/src/ContractionState.cxx
Examining data/scite-4.4.5/scintilla/src/DBCS.cxx
Examining data/scite-4.4.5/scintilla/src/XPM.cxx
Examining data/scite-4.4.5/scintilla/src/CallTip.h
Examining data/scite-4.4.5/scintilla/src/LineMarker.h
Examining data/scite-4.4.5/scintilla/src/RESearch.h
Examining data/scite-4.4.5/scintilla/src/Decoration.h
Examining data/scite-4.4.5/scintilla/src/CellBuffer.h
Examining data/scite-4.4.5/scintilla/src/SplitVector.h
Examining data/scite-4.4.5/scintilla/src/Position.h
Examining data/scite-4.4.5/scintilla/src/ExternalLexer.h
Examining data/scite-4.4.5/scintilla/src/ExternalLexer.cxx
Examining data/scite-4.4.5/scintilla/src/PerLine.h
Examining data/scite-4.4.5/scintilla/src/KeyMap.h
Examining data/scite-4.4.5/scintilla/src/Indicator.h
Examining data/scite-4.4.5/scintilla/src/CaseFolder.h
Examining data/scite-4.4.5/scintilla/src/Style.h
Examining data/scite-4.4.5/scintilla/src/RESearch.cxx
Examining data/scite-4.4.5/scintilla/src/Indicator.cxx
Examining data/scite-4.4.5/scintilla/src/PerLine.cxx
Examining data/scite-4.4.5/scintilla/src/ElapsedPeriod.h
Examining data/scite-4.4.5/scintilla/src/PositionCache.h
Examining data/scite-4.4.5/scintilla/src/Editor.h
Examining data/scite-4.4.5/scintilla/src/Style.cxx
Examining data/scite-4.4.5/scintilla/src/CallTip.cxx
Examining data/scite-4.4.5/scintilla/src/EditView.h
Examining data/scite-4.4.5/scintilla/src/ViewStyle.cxx
Examining data/scite-4.4.5/scintilla/src/DBCS.h
Examining data/scite-4.4.5/scintilla/src/Document.cxx
Examining data/scite-4.4.5/scintilla/src/UniConversion.cxx
Examining data/scite-4.4.5/scintilla/src/EditModel.cxx
Examining data/scite-4.4.5/scintilla/src/Document.h
Examining data/scite-4.4.5/scintilla/src/ContractionState.h
Examining data/scite-4.4.5/scintilla/src/CaseConvert.cxx
Examining data/scite-4.4.5/scintilla/src/AutoComplete.h
Examining data/scite-4.4.5/scintilla/src/SparseVector.h
Examining data/scite-4.4.5/scintilla/src/MarginView.h
Examining data/scite-4.4.5/scintilla/src/Decoration.cxx
Examining data/scite-4.4.5/scintilla/src/Catalogue.cxx
Examining data/scite-4.4.5/scintilla/src/RunStyles.cxx
Examining data/scite-4.4.5/scintilla/src/KeyMap.cxx
Examining data/scite-4.4.5/scintilla/src/Selection.h
Examining data/scite-4.4.5/scintilla/src/Selection.cxx
Examining data/scite-4.4.5/scintilla/src/UniqueString.cxx
Examining data/scite-4.4.5/scintilla/src/RunStyles.h
Examining data/scite-4.4.5/scintilla/src/CellBuffer.cxx
Examining data/scite-4.4.5/scintilla/test/unit/unitTest.cxx
Examining data/scite-4.4.5/scintilla/test/unit/testPerLine.cxx
Examining data/scite-4.4.5/scintilla/test/unit/testDecoration.cxx
Examining data/scite-4.4.5/scintilla/test/unit/testSparseVector.cxx
Examining data/scite-4.4.5/scintilla/test/unit/testSplitVector.cxx
Examining data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx
Examining data/scite-4.4.5/scintilla/test/unit/testPartitioning.cxx
Examining data/scite-4.4.5/scintilla/test/unit/testUniConversion.cxx
Examining data/scite-4.4.5/scintilla/test/unit/UnitTester.cxx
Examining data/scite-4.4.5/scintilla/test/unit/testRunStyles.cxx
Examining data/scite-4.4.5/scintilla/test/unit/catch.hpp
Examining data/scite-4.4.5/scintilla/test/unit/testContractionState.cxx
Examining data/scite-4.4.5/scintilla/test/unit/testWordList.cxx
Examining data/scite-4.4.5/scintilla/test/unit/testCharClassify.cxx
Examining data/scite-4.4.5/scintilla/test/unit/testSparseState.cxx
Examining data/scite-4.4.5/scintilla/test/examples/x.cxx
Examining data/scite-4.4.5/scintilla/win32/HanjaDic.h
Examining data/scite-4.4.5/scintilla/win32/ScintillaWin.cxx
Examining data/scite-4.4.5/scintilla/win32/PlatWin.h
Examining data/scite-4.4.5/scintilla/win32/PlatWin.cxx
Examining data/scite-4.4.5/scintilla/win32/ScintillaDLL.cxx
Examining data/scite-4.4.5/scintilla/win32/ScintillaWin.h
Examining data/scite-4.4.5/scintilla/win32/HanjaDic.cxx
Examining data/scite-4.4.5/scite/gtk/Widget.cxx
Examining data/scite-4.4.5/scite/gtk/GUIGTK.cxx
Examining data/scite-4.4.5/scite/gtk/pixmapsGNOME.h
Examining data/scite-4.4.5/scite/gtk/SciIcon.h
Examining data/scite-4.4.5/scite/gtk/Widget.h
Examining data/scite-4.4.5/scite/gtk/DirectorExtension.cxx
Examining data/scite-4.4.5/scite/gtk/SciTEGTK.cxx
Examining data/scite-4.4.5/scite/gtk/DirectorExtension.h
Examining data/scite-4.4.5/scite/lua/src/lobject.h
Examining data/scite-4.4.5/scite/lua/src/lcode.h
Examining data/scite-4.4.5/scite/lua/src/lbitlib.c
Examining data/scite-4.4.5/scite/lua/src/ltm.c
Examining data/scite-4.4.5/scite/lua/src/lctype.c
Examining data/scite-4.4.5/scite/lua/src/llimits.h
Examining data/scite-4.4.5/scite/lua/src/lauxlib.c
Examining data/scite-4.4.5/scite/lua/src/ldump.c
Examining data/scite-4.4.5/scite/lua/src/lmathlib.c
Examining data/scite-4.4.5/scite/lua/src/lcode.c
Examining data/scite-4.4.5/scite/lua/src/lvm.c
Examining data/scite-4.4.5/scite/lua/src/lutf8lib.c
Examining data/scite-4.4.5/scite/lua/src/ldebug.c
Examining data/scite-4.4.5/scite/lua/src/loslib.c
Examining data/scite-4.4.5/scite/lua/src/ldo.c
Examining data/scite-4.4.5/scite/lua/src/ldblib.c
Examining data/scite-4.4.5/scite/lua/src/liolib.c
Examining data/scite-4.4.5/scite/lua/src/lctype.h
Examining data/scite-4.4.5/scite/lua/src/lopcodes.c
Examining data/scite-4.4.5/scite/lua/src/lapi.h
Examining data/scite-4.4.5/scite/lua/src/lparser.h
Examining data/scite-4.4.5/scite/lua/src/lvm.h
Examining data/scite-4.4.5/scite/lua/src/lparser.c
Examining data/scite-4.4.5/scite/lua/src/lstring.c
Examining data/scite-4.4.5/scite/lua/src/ltable.c
Examining data/scite-4.4.5/scite/lua/src/ltm.h
Examining data/scite-4.4.5/scite/lua/src/lgc.h
Examining data/scite-4.4.5/scite/lua/src/llex.h
Examining data/scite-4.4.5/scite/lua/src/lmem.h
Examining data/scite-4.4.5/scite/lua/src/ldo.h
Examining data/scite-4.4.5/scite/lua/src/lua.hpp
Examining data/scite-4.4.5/scite/lua/src/lfunc.c
Examining data/scite-4.4.5/scite/lua/src/loadlib.c
Examining data/scite-4.4.5/scite/lua/src/linit.c
Examining data/scite-4.4.5/scite/lua/src/lcorolib.c
Examining data/scite-4.4.5/scite/lua/src/lprefix.h
Examining data/scite-4.4.5/scite/lua/src/lbaselib.c
Examining data/scite-4.4.5/scite/lua/src/ltablib.c
Examining data/scite-4.4.5/scite/lua/src/lopcodes.h
Examining data/scite-4.4.5/scite/lua/src/lgc.c
Examining data/scite-4.4.5/scite/lua/src/lfunc.h
Examining data/scite-4.4.5/scite/lua/src/lobject.c
Examining data/scite-4.4.5/scite/lua/src/lzio.c
Examining data/scite-4.4.5/scite/lua/src/ldebug.h
Examining data/scite-4.4.5/scite/lua/src/lapi.c
Examining data/scite-4.4.5/scite/lua/src/lstate.h
Examining data/scite-4.4.5/scite/lua/src/lmem.c
Examining data/scite-4.4.5/scite/lua/src/lua.h
Examining data/scite-4.4.5/scite/lua/src/lualib.h
Examining data/scite-4.4.5/scite/lua/src/lauxlib.h
Examining data/scite-4.4.5/scite/lua/src/lundump.h
Examining data/scite-4.4.5/scite/lua/src/llex.c
Examining data/scite-4.4.5/scite/lua/src/lstate.c
Examining data/scite-4.4.5/scite/lua/src/ltable.h
Examining data/scite-4.4.5/scite/lua/src/lstrlib.c
Examining data/scite-4.4.5/scite/lua/src/lzio.h
Examining data/scite-4.4.5/scite/lua/src/lstring.h
Examining data/scite-4.4.5/scite/lua/src/luaconf.h
Examining data/scite-4.4.5/scite/lua/src/lundump.c
Examining data/scite-4.4.5/scite/src/StyleWriter.h
Examining data/scite-4.4.5/scite/src/FileWorker.cxx
Examining data/scite-4.4.5/scite/src/FilePath.h
Examining data/scite-4.4.5/scite/src/MultiplexExtension.cxx
Examining data/scite-4.4.5/scite/src/SciTEProps.cxx
Examining data/scite-4.4.5/scite/src/JobQueue.cxx
Examining data/scite-4.4.5/scite/src/scite_lua_win.h
Examining data/scite-4.4.5/scite/src/StringList.cxx
Examining data/scite-4.4.5/scite/src/MultiplexExtension.h
Examining data/scite-4.4.5/scite/src/Utf8_16.h
Examining data/scite-4.4.5/scite/src/SciTEBase.h
Examining data/scite-4.4.5/scite/src/EditorConfig.cxx
Examining data/scite-4.4.5/scite/src/Cookie.h
Examining data/scite-4.4.5/scite/src/ExportTEX.cxx
Examining data/scite-4.4.5/scite/src/ScintillaMessages.h
Examining data/scite-4.4.5/scite/src/EditorConfig.h
Examining data/scite-4.4.5/scite/src/LexillaLibrary.h
Examining data/scite-4.4.5/scite/src/ExportPDF.cxx
Examining data/scite-4.4.5/scite/src/StyleWriter.cxx
Examining data/scite-4.4.5/scite/src/GUI.h
Examining data/scite-4.4.5/scite/src/PropSetFile.h
Examining data/scite-4.4.5/scite/src/SciTEKeys.h
Examining data/scite-4.4.5/scite/src/LexillaLibrary.cxx
Examining data/scite-4.4.5/scite/src/FilePath.cxx
Examining data/scite-4.4.5/scite/src/StyleDefinition.h
Examining data/scite-4.4.5/scite/src/LuaExtension.cxx
Examining data/scite-4.4.5/scite/src/ScintillaCall.cxx
Examining data/scite-4.4.5/scite/src/SciTEBase.cxx
Examining data/scite-4.4.5/scite/src/ExportRTF.cxx
Examining data/scite-4.4.5/scite/src/IFaceTable.h
Examining data/scite-4.4.5/scite/src/MatchMarker.cxx
Examining data/scite-4.4.5/scite/src/IFaceTable.cxx
Examining data/scite-4.4.5/scite/src/StripDefinition.h
Examining data/scite-4.4.5/scite/src/SciTE.h
Examining data/scite-4.4.5/scite/src/ScintillaWindow.h
Examining data/scite-4.4.5/scite/src/LuaExtension.h
Examining data/scite-4.4.5/scite/src/PropSetFile.cxx
Examining data/scite-4.4.5/scite/src/JobQueue.h
Examining data/scite-4.4.5/scite/src/Worker.h
Examining data/scite-4.4.5/scite/src/StringHelpers.cxx
Examining data/scite-4.4.5/scite/src/ExportXML.cxx
Examining data/scite-4.4.5/scite/src/Extender.h
Examining data/scite-4.4.5/scite/src/Cookie.cxx
Examining data/scite-4.4.5/scite/src/StyleDefinition.cxx
Examining data/scite-4.4.5/scite/src/FileWorker.h
Examining data/scite-4.4.5/scite/src/Utf8_16.cxx
Examining data/scite-4.4.5/scite/src/StringList.h
Examining data/scite-4.4.5/scite/src/StringHelpers.h
Examining data/scite-4.4.5/scite/src/ExportHTML.cxx
Examining data/scite-4.4.5/scite/src/ScintillaTypes.h
Examining data/scite-4.4.5/scite/src/MatchMarker.h
Examining data/scite-4.4.5/scite/src/SciTEIO.cxx
Examining data/scite-4.4.5/scite/src/ScintillaWindow.cxx
Examining data/scite-4.4.5/scite/src/SciTEBuffers.cxx
Examining data/scite-4.4.5/scite/src/ScintillaCall.h
Examining data/scite-4.4.5/scite/src/Credits.cxx
Examining data/scite-4.4.5/scite/win32/SciTEWinBar.cxx
Examining data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx
Examining data/scite-4.4.5/scite/win32/GUIWin.cxx
Examining data/scite-4.4.5/scite/win32/UniqueInstance.h
Examining data/scite-4.4.5/scite/win32/Strips.h
Examining data/scite-4.4.5/scite/win32/SciTEWin.h
Examining data/scite-4.4.5/scite/win32/SciTEWin.cxx
Examining data/scite-4.4.5/scite/win32/UniqueInstance.cxx
Examining data/scite-4.4.5/scite/win32/DirectorExtension.cxx
Examining data/scite-4.4.5/scite/win32/Strips.cxx
Examining data/scite-4.4.5/scite/win32/DirectorExtension.h
Examining data/scite-4.4.5/scite/win32/DLLFunction.h

FINAL RESULTS:

data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:5462:6:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	if (readlink("/proc/self/exe", selfExe, PATH_MAX) == -1) {
data/scite-4.4.5/scintilla/gtk/PlatGTK.cxx:2038:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(buffer, format, pArguments);
data/scite-4.4.5/scintilla/lexers/LexAU3.cxx:241:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(s_save,s);
data/scite-4.4.5/scintilla/lexers/LexCaml.cxx:92:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(buffer,format,pArguments);
data/scite-4.4.5/scintilla/lexers/LexDMAP.cxx:193:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(prevWord, s);
data/scite-4.4.5/scintilla/lexers/LexDMIS.cxx:130:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(this->m_wordListSets, DMISWordListDesc[i]);
data/scite-4.4.5/scintilla/lexers/LexEScript.cxx:238:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(prevWord, s);
data/scite-4.4.5/scintilla/lexers/LexFortran.cxx:658:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(prevWord, s);
data/scite-4.4.5/scintilla/lexers/LexPowerPro.cxx:155:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(s_save,s);
data/scite-4.4.5/scintilla/lexers/LexRuby.cxx:141:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(prevWord, s);
data/scite-4.4.5/scintilla/lexers/LexScriptol.cxx:48:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(prevWord, s);
data/scite-4.4.5/scintilla/lexers/LexVHDL.cxx:294:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(prevWord, s);
data/scite-4.4.5/scintilla/lexers/LexVHDL.cxx:494:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(prevWord, s);
data/scite-4.4.5/scintilla/lexilla/src/Lexilla.cxx:320:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(name, lexerName);
data/scite-4.4.5/scintilla/qt/ScintillaEditBase/PlatQt.cpp:1198:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(fontNameDefault, font.family().toUtf8());
data/scite-4.4.5/scintilla/qt/ScintillaEditBase/PlatQt.cpp:1224:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(buffer, format, pArguments);
data/scite-4.4.5/scintilla/qt/ScintillaEditBase/PlatQt.cpp:1237:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buffer, "Assertion [%s] failed at %s %d", c, file, line);
data/scite-4.4.5/scintilla/test/unit/UnitTester.cxx:34:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(buffer, format, pArguments);
data/scite-4.4.5/scintilla/test/unit/unitTest.cxx:70:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(buffer, format, pArguments);
data/scite-4.4.5/scintilla/win32/PlatWin.cxx:3480:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(buffer,format,pArguments);
data/scite-4.4.5/scintilla/win32/PlatWin.cxx:3499:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buffer, "Assertion [%s] failed at %s %d%s", c, file, line, assertionPopUps ? "" : "\r\n");
data/scite-4.4.5/scite/gtk/DirectorExtension.cxx:402:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(pipeName,"%s/SciTE.%d.%d.out", g_get_tmp_dir(), getpid(), kount++);
data/scite-4.4.5/scite/gtk/DirectorExtension.cxx:494:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(requestPipeName,"%s/SciTE.%d.in", g_get_tmp_dir(), getpid());
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:1029:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(filePath.AsInternal(), W_OK)) {
data/scite-4.4.5/scite/lua/src/lauxlib.h:234:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        (fprintf(stderr, (s), (p)), fflush(stderr))
data/scite-4.4.5/scite/lua/src/liolib.c:59:40:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
#define l_popen(L,c,m)		(fflush(NULL), popen(c,m))
data/scite-4.4.5/scite/lua/src/liolib.c:622:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                ? fprintf(f, LUA_INTEGER_FMT,
data/scite-4.4.5/scite/lua/src/liolib.c:624:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                : fprintf(f, LUA_NUMBER_FMT,
data/scite-4.4.5/scite/lua/src/lobject.c:286:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buff, s);  /* copy string to buffer */
data/scite-4.4.5/scite/lua/src/loslib.c:122:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(b, LUA_TMPNAMTEMPLATE); \
data/scite-4.4.5/scite/lua/src/loslib.c:143:14:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  int stat = system(cmd);
data/scite-4.4.5/scite/lua/src/lstrlib.c:1010:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(form + l - 1, lenmod);
data/scite-4.4.5/scite/lua/src/luaconf.h:610:29:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define l_sprintf(s,sz,f,i)	snprintf(s,sz,f,i)
data/scite-4.4.5/scite/lua/src/luaconf.h:612:42:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
#define l_sprintf(s,sz,f,i)	((void)(sz), sprintf(s,f,i))
data/scite-4.4.5/scite/src/ExportPDF.cxx:265:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buffer, "<</Type/Font/Subtype/Type1"
data/scite-4.4.5/scite/src/FilePath.cxx:250:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
static int access(const wchar_t *path, int mode) noexcept {
data/scite-4.4.5/scite/src/FilePath.cxx:447:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(AsInternal(), R_OK) == -1)
data/scite-4.4.5/scite/src/FilePath.cxx:739:13:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	FILE *fp = popen(command, "r");
data/scite-4.4.5/scite/src/SciTEBase.cxx:4624:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(&tbuff[alen], "%s", sRep.c_str());
data/scite-4.4.5/scite/src/SciTEProps.cxx:269:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(key, "style.%s.%0d", lang, style);
data/scite-4.4.5/scite/src/SciTEProps.cxx:290:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(key, "style.%s.%0d.%0d", languageName.c_str(), baseStyle, subStyle + 1);
data/scite-4.4.5/scite/src/SciTEProps.cxx:331:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(key, "style.%s.%0d", lang, style-start);
data/scite-4.4.5/scite/src/SciTEProps.cxx:974:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(bracesStyleKey, "braces.%s.style", language.c_str());
data/scite-4.4.5/scite/src/SciTEProps.cxx:993:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(key, "autocomplete.%s.start.characters", language.c_str());
data/scite-4.4.5/scite/src/SciTEProps.cxx:999:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(key, "autocomplete.%s.fillups", language.c_str());
data/scite-4.4.5/scite/src/SciTEProps.cxx:1006:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(key, "autocomplete.%s.typesep", language.c_str());
data/scite-4.4.5/scite/src/SciTEProps.cxx:1016:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(key, "autocomplete.%s.ignorecase", "*");
data/scite-4.4.5/scite/src/SciTEProps.cxx:1019:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(key, "autocomplete.%s.ignorecase", language.c_str());
data/scite-4.4.5/scite/src/SciTEProps.cxx:1509:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(key, "style.%s.%0d", "*", StyleDefault);
data/scite-4.4.5/scite/src/SciTEProps.cxx:1514:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(key, "style.%s.%0d", languageName, StyleDefault);
data/scite-4.4.5/scite/src/SciTEProps.cxx:1535:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(key, "style.%s.%0d.%0d", languageName, subStyleBase + activity, subStyle+1);
data/scite-4.4.5/scite/src/SciTEProps.cxx:1548:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(key, "style.%s.%0d", "errorlist", StyleDefault);
data/scite-4.4.5/scintilla/test/unit/catch.hpp:7242:18:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            std::srand( config.rngSeed() );
data/scite-4.4.5/scintilla/win32/PlatWin.cxx:99:14:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	hDLLD2D = ::LoadLibraryEx(TEXT("D2D1.DLL"), 0, loadLibraryFlags);
data/scite-4.4.5/scintilla/win32/PlatWin.cxx:108:17:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	hDLLDWrite = ::LoadLibraryEx(TEXT("DWRITE.DLL"), 0, loadLibraryFlags);
data/scite-4.4.5/scite/gtk/DirectorExtension.cxx:402:44:  [3] (buffer) g_get_tmp_dir:
  This function is synonymous with 'getenv("TMP")';it returns untrustable
  input if the environment can beset by an attacker. It can have any content
  and length, and the same variable can be set more than once (CWE-807,
  CWE-20). Check environment variables carefully before using them.
				sprintf(pipeName,"%s/SciTE.%d.%d.out", g_get_tmp_dir(), getpid(), kount++);
data/scite-4.4.5/scite/gtk/DirectorExtension.cxx:494:45:  [3] (buffer) g_get_tmp_dir:
  This function is synonymous with 'getenv("TMP")';it returns untrustable
  input if the environment can beset by an attacker. It can have any content
  and length, and the same variable can be set more than once (CWE-807,
  CWE-20). Check environment variables carefully before using them.
		sprintf(requestPipeName,"%s/SciTE.%d.in", g_get_tmp_dir(), getpid());
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:922:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *where = getenv("SciTE_HOME");
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:929:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		where = getenv("HOME");
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:940:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *where = getenv("SciTE_HOME");
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:947:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		where = getenv("HOME");
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:961:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *where = getenv("SciTE_USERHOME");
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:963:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		where = getenv("SciTE_HOME");
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:965:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			where = getenv("HOME");
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:5281:24:  [3] (buffer) g_get_tmp_dir:
  This function is synonymous with 'getenv("TMP")';it returns untrustable
  input if the environment can beset by an attacker. It can have any content
  and length, and the same variable can be set more than once (CWE-807,
  CWE-20). Check environment variables carefully before using them.
	const gchar *tmpdir = g_get_tmp_dir();
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:5291:19:  [3] (buffer) g_get_tmp_dir:
  This function is synonymous with 'getenv("TMP")';it returns untrustable
  input if the environment can beset by an attacker. It can have any content
  and length, and the same variable can be set more than once (CWE-807,
  CWE-20). Check environment variables carefully before using them.
	uniqueInstance = g_get_tmp_dir();
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:5293:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	uniqueInstance += getenv("USER");
data/scite-4.4.5/scite/lua/src/lmathlib.c:28:18:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define l_rand()	random()
data/scite-4.4.5/scite/lua/src/lmathlib.c:29:20:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define l_srand(x)	srandom(x)
data/scite-4.4.5/scite/lua/src/lmathlib.c:33:20:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define l_srand(x)	srand(x)
data/scite-4.4.5/scite/lua/src/loadlib.c:294:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *path = getenv(nver);  /* use versioned name */
data/scite-4.4.5/scite/lua/src/loadlib.c:296:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    path = getenv(envname);  /* try unversioned name */
data/scite-4.4.5/scite/lua/src/loslib.c:131:33:  [3] (tmpfile) tmpnam:
  Temporary file race condition (CWE-377).
#define lua_tmpnam(b,e)		{ e = (tmpnam(b) == NULL); }
data/scite-4.4.5/scite/lua/src/loslib.c:178:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  lua_pushstring(L, getenv(luaL_checkstring(L, 1)));  /* if NULL push nil */
data/scite-4.4.5/scite/src/SciTEBuffers.cxx:1125:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	GUI::gui_string homeDirectory = getenv("HOME");
data/scite-4.4.5/scite/win32/SciTEWin.cxx:600:11:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
		hHH = ::LoadLibrary(TEXT("HHCTRL.OCX"));
data/scite-4.4.5/scite/win32/SciTEWin.cxx:2369:19:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	HMODULE hmod = ::LoadLibrary(scintillaName);
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:45:12:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
			hMM = ::LoadLibrary(TEXT("WINMM.DLL"));
data/scite-4.4.5/scite/win32/Strips.cxx:190:25:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	HINSTANCE hinstDll = ::LoadLibrary(lpszDllName);
data/scite-4.4.5/scintilla/gtk/PlatGTK.cxx:672:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char wcForm[2] {};
data/scite-4.4.5/scintilla/gtk/PlatGTK.cxx:1897:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			Append(startword, numword?atoi(numword + 1):-1);
data/scite-4.4.5/scintilla/gtk/PlatGTK.cxx:1907:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		Append(startword, numword?atoi(numword + 1):-1);
data/scite-4.4.5/scintilla/gtk/PlatGTK.cxx:2035:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[2000];
data/scite-4.4.5/scintilla/gtk/PlatGTK.cxx:2057:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[2000];
data/scite-4.4.5/scintilla/gtk/ScintillaGTK.cxx:766:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(text, tmputf.c_str(), tmputf.length());
data/scite-4.4.5/scintilla/gtk/ScintillaGTK.cxx:784:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(encoded, utf8, inputLength);
data/scite-4.4.5/scintilla/gtk/ScintillaGTK.cxx:793:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(encoded, tmpEncoded.c_str(), tmpEncoded.length());
data/scite-4.4.5/scintilla/gtk/ScintillaGTK.cxx:798:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(encoded, utf8, inputLength);
data/scite-4.4.5/scintilla/gtk/ScintillaGTK.cxx:1136:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(folded, mapped,  lenMapped);
data/scite-4.4.5/scintilla/gtk/ScintillaGTK.cxx:1162:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char sCharacter[2] = "A";
data/scite-4.4.5/scintilla/gtk/ScintillaGTKAccessible.cxx:190:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(utf8Text, tmputf.c_str(), len);
data/scite-4.4.5/scintilla/lexers/LexA68k.cxx:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Buffer[100];
data/scite-4.4.5/scintilla/lexers/LexAPDL.cxx:86:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexAPDL.cxx:192:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char word[256];
data/scite-4.4.5/scintilla/lexers/LexASY.cxx:70:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s[1000];
data/scite-4.4.5/scintilla/lexers/LexASY.cxx:174:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[100]="";
data/scite-4.4.5/scintilla/lexers/LexAU3.cxx:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	szSpecial[100];
data/scite-4.4.5/scintilla/lexers/LexAU3.cxx:229:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s_save[100] = "";
data/scite-4.4.5/scintilla/lexers/LexAU3.cxx:235:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s[100];
data/scite-4.4.5/scintilla/lexers/LexAU3.cxx:467:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char sk[100];
data/scite-4.4.5/scintilla/lexers/LexAU3.cxx:618:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char sk[100];
data/scite-4.4.5/scintilla/lexers/LexAU3.cxx:706:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szKeyword[11]="";
data/scite-4.4.5/scintilla/lexers/LexAU3.cxx:708:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szThen[5]="";
data/scite-4.4.5/scintilla/lexers/LexAVE.cxx:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexAVE.cxx:168:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[10] = "";
data/scite-4.4.5/scintilla/lexers/LexAVS.cxx:95:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexAVS.cxx:185:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s[100];
data/scite-4.4.5/scintilla/lexers/LexAbaqus.cxx:377:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char word[256] ;
data/scite-4.4.5/scintilla/lexers/LexAsm.cxx:294:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexAsm.cxx:401:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char word[100];
data/scite-4.4.5/scintilla/lexers/LexAsn1.cxx:90:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexBaan.cxx:512:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char word[1000];
data/scite-4.4.5/scintilla/lexers/LexBaan.cxx:545:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[1000];
data/scite-4.4.5/scintilla/lexers/LexBaan.cxx:546:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s1[1000];
data/scite-4.4.5/scintilla/lexers/LexBaan.cxx:549:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(s1, s, sizeof(s));
data/scite-4.4.5/scintilla/lexers/LexBaan.cxx:737:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char word[100];
data/scite-4.4.5/scintilla/lexers/LexBash.cxx:326:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char Delimiter[HERE_DELIM_MAX];	// the Delimiter
data/scite-4.4.5/scintilla/lexers/LexBash.cxx:483:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s[500];
data/scite-4.4.5/scintilla/lexers/LexBash.cxx:484:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s2[10];
data/scite-4.4.5/scintilla/lexers/LexBash.cxx:544:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s[500];
data/scite-4.4.5/scintilla/lexers/LexBash.cxx:561:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char s[10];
data/scite-4.4.5/scintilla/lexers/LexBash.cxx:687:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s[HERE_DELIM_MAX];
data/scite-4.4.5/scintilla/lexers/LexBash.cxx:708:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s[500];
data/scite-4.4.5/scintilla/lexers/LexBash.cxx:920:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[10];
data/scite-4.4.5/scintilla/lexers/LexBash.cxx:1011:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char word[8] = { '\0' }; // we're not interested in long words anyway
data/scite-4.4.5/scintilla/lexers/LexBasic.cxx:337:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s[100];
data/scite-4.4.5/scintilla/lexers/LexBasic.cxx:489:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char word[256];
data/scite-4.4.5/scintilla/lexers/LexBatch.cxx:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char strBuffer[1024];
data/scite-4.4.5/scintilla/lexers/LexBatch.cxx:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lineBuffer[1024];
data/scite-4.4.5/scintilla/lexers/LexBatch.cxx:127:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char wordBuffer[81];		// Word Buffer - large to catch long paths
data/scite-4.4.5/scintilla/lexers/LexBatch.cxx:141:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char sKeywordBuffer[10];	// Special Keyword Buffer
data/scite-4.4.5/scintilla/lexers/LexBullant.cxx:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[100];
data/scite-4.4.5/scintilla/lexers/LexCIL.cxx:254:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char kwSize[100];
data/scite-4.4.5/scintilla/lexers/LexCLW.cxx:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cNumericString[512];	// Numeric string buffer
data/scite-4.4.5/scintilla/lexers/LexCLW.cxx:230:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char cLabel[512];		// Label buffer
data/scite-4.4.5/scintilla/lexers/LexCLW.cxx:249:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char cWord[512];	// Word buffer
data/scite-4.4.5/scintilla/lexers/LexCLW.cxx:273:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char cEquate[512];		// Equate buffer
data/scite-4.4.5/scintilla/lexers/LexCLW.cxx:290:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char cStatement[512];		// Statement buffer
data/scite-4.4.5/scintilla/lexers/LexCLW.cxx:630:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char chBuffer[100];
data/scite-4.4.5/scintilla/lexers/LexCOBOL.cxx:90:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[100];
data/scite-4.4.5/scintilla/lexers/LexCPP.cxx:145:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char marker[lengthMarker+1] = "";
data/scite-4.4.5/scintilla/lexers/LexCPP.cxx:936:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s[1000];
data/scite-4.4.5/scintilla/lexers/LexCPP.cxx:1066:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s[100];
data/scite-4.4.5/scintilla/lexers/LexCPP.cxx:1669:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			int isTrue = atoi(tokens[j+1].c_str());
data/scite-4.4.5/scintilla/lexers/LexCPP.cxx:1693:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				const int valA = atoi(tokens[k].c_str());
data/scite-4.4.5/scintilla/lexers/LexCPP.cxx:1694:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				const int valB = atoi(tokens[k+2].c_str());
data/scite-4.4.5/scintilla/lexers/LexCSS.cxx:415:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s[100];
data/scite-4.4.5/scintilla/lexers/LexCaml.cxx:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[2000];
data/scite-4.4.5/scintilla/lexers/LexCaml.cxx:139:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(name, LexerName, n), name[n] = '\0';
data/scite-4.4.5/scintilla/lexers/LexCaml.cxx:263:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char t[24];
data/scite-4.4.5/scintilla/lexers/LexCmake.cxx:80:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[20]; // The key word we are looking for has atmost 13 characters
data/scite-4.4.5/scintilla/lexers/LexCmake.cxx:104:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char word[100] = {0};
data/scite-4.4.5/scintilla/lexers/LexCmake.cxx:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lowercaseWord[100] = {0};
data/scite-4.4.5/scintilla/lexers/LexCoffeeScript.cxx:183:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s[1000];
data/scite-4.4.5/scintilla/lexers/LexCsound.cxx:89:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexCsound.cxx:168:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s[20];
data/scite-4.4.5/scintilla/lexers/LexD.cxx:290:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s[1000];
data/scite-4.4.5/scintilla/lexers/LexD.cxx:352:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s[100];
data/scite-4.4.5/scintilla/lexers/LexDMAP.cxx:82:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char s[100];
data/scite-4.4.5/scintilla/lexers/LexDMAP.cxx:169:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prevWord[32] = "";
data/scite-4.4.5/scintilla/lexers/LexDMAP.cxx:186:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char s[32];
data/scite-4.4.5/scintilla/lexers/LexDMIS.cxx:250:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char tmpStr[MAX_STR_LEN];
data/scite-4.4.5/scintilla/lexers/LexDataflex.cxx:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[100];
data/scite-4.4.5/scintilla/lexers/LexDataflex.cxx:381:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[100];	// Size of the longest possible keyword + one additional character + null
data/scite-4.4.5/scintilla/lexers/LexDataflex.cxx:416:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[100];
data/scite-4.4.5/scintilla/lexers/LexDataflex.cxx:482:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[100];
data/scite-4.4.5/scintilla/lexers/LexDiff.cxx:48:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (lineBuffer[3] == ' ' && atoi(lineBuffer + 4) && !strchr(lineBuffer, '/'))
data/scite-4.4.5/scintilla/lexers/LexDiff.cxx:59:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (atoi(lineBuffer+4) && !strchr(lineBuffer, '/'))
data/scite-4.4.5/scintilla/lexers/LexDiff.cxx:69:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (lineBuffer[3] == ' ' && atoi(lineBuffer+4) && !strchr(lineBuffer, '/'))
data/scite-4.4.5/scintilla/lexers/LexDiff.cxx:103:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lineBuffer[DIFF_BUFFER_START_SIZE] = "";
data/scite-4.4.5/scintilla/lexers/LexECL.cxx:162:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s[1000];
data/scite-4.4.5/scintilla/lexers/LexECL.cxx:182:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char s2[1000];
data/scite-4.4.5/scintilla/lexers/LexECL.cxx:245:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s[1000];
data/scite-4.4.5/scintilla/lexers/LexEDIFACT.cxx:112:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	int DetectSegmentHeader(char SegmentHeader[3]) const;
data/scite-4.4.5/scintilla/lexers/LexEDIFACT.cxx:174:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char SegmentHeader[4] = { 0 };
data/scite-4.4.5/scintilla/lexers/LexEDIFACT.cxx:236:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SegmentHeader[4] = { 0 };
data/scite-4.4.5/scintilla/lexers/LexEDIFACT.cxx:318:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char bufUNA[9];
data/scite-4.4.5/scintilla/lexers/LexEDIFACT.cxx:369:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int LexerEDIFACT::DetectSegmentHeader(char SegmentHeader[3]) const
data/scite-4.4.5/scintilla/lexers/LexEScript.cxx:80:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexEScript.cxx:192:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prevWord[32] = "";
data/scite-4.4.5/scintilla/lexers/LexEScript.cxx:231:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[32];
data/scite-4.4.5/scintilla/lexers/LexEiffel.cxx:67:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexEiffel.cxx:185:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s[20];
data/scite-4.4.5/scintilla/lexers/LexErlang.cxx:92:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cur[100];
data/scite-4.4.5/scintilla/lexers/LexErrorList.cxx:230:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char word[512];
data/scite-4.4.5/scintilla/lexers/LexFlagship.cxx:74:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s[64];
data/scite-4.4.5/scintilla/lexers/LexFlagship.cxx:155:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s[64];
data/scite-4.4.5/scintilla/lexers/LexForth.cxx:67:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexFortran.cxx:166:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexFortran.cxx:522:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prevWord[32] = "";
data/scite-4.4.5/scintilla/lexers/LexFortran.cxx:556:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[32];
data/scite-4.4.5/scintilla/lexers/LexGAP.cxx:106:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char s[1000];
data/scite-4.4.5/scintilla/lexers/LexGAP.cxx:225:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexGui4Cli.cxx:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[BUFFSIZE+1];	// buffer for command name
data/scite-4.4.5/scintilla/lexers/LexHTML.cxx:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[100];
data/scite-4.4.5/scintilla/lexers/LexHTML.cxx:339:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[30 + 1];
data/scite-4.4.5/scintilla/lexers/LexHaskell.cxx:645:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char s[100];
data/scite-4.4.5/scintilla/lexers/LexHaskell.cxx:739:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char s[100];
data/scite-4.4.5/scintilla/lexers/LexHollywood.cxx:347:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexHollywood.cxx:459:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char word[256];
data/scite-4.4.5/scintilla/lexers/LexJSON.cxx:187:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char word[51];
data/scite-4.4.5/scintilla/lexers/LexKVIrc.cxx:313:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char s[100];
data/scite-4.4.5/scintilla/lexers/LexKix.cxx:80:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexKix.cxx:94:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexLaTeX.cxx:158:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[32];
data/scite-4.4.5/scintilla/lexers/LexLaTeX.cxx:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[32];
data/scite-4.4.5/scintilla/lexers/LexLaTeX.cxx:493:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *structWords[7] = {"part", "chapter", "section", "subsection",
data/scite-4.4.5/scintilla/lexers/LexLaTeX.cxx:501:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ch, buf[16];
data/scite-4.4.5/scintilla/lexers/LexLisp.cxx:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[100];
data/scite-4.4.5/scintilla/lexers/LexLout.cxx:85:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexLout.cxx:101:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexLout.cxx:152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[10] = "";
data/scite-4.4.5/scintilla/lexers/LexLua.cxx:148:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s[100];
data/scite-4.4.5/scintilla/lexers/LexLua.cxx:210:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s[100];
data/scite-4.4.5/scintilla/lexers/LexLua.cxx:406:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[10] = "";
data/scite-4.4.5/scintilla/lexers/LexMMIXAL.cxx:100:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s0[100];
data/scite-4.4.5/scintilla/lexers/LexMMIXAL.cxx:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexMSSQL.cxx:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/scite-4.4.5/scintilla/lexers/LexMSSQL.cxx:288:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[10] = "";
data/scite-4.4.5/scintilla/lexers/LexMagik.cxx:132:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	            char keyword[50];
data/scite-4.4.5/scintilla/lexers/LexMagik.cxx:215:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char keyword[50];
data/scite-4.4.5/scintilla/lexers/LexMagik.cxx:393:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char keyword[50];
data/scite-4.4.5/scintilla/lexers/LexMake.cxx:118:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lineBuffer[1024];
data/scite-4.4.5/scintilla/lexers/LexMatlab.cxx:157:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexMatlab.cxx:313:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char word[100];
data/scite-4.4.5/scintilla/lexers/LexMaxima.cxx:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[100];
data/scite-4.4.5/scintilla/lexers/LexMetapost.cxx:125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lineBuffer[1024] ;
data/scite-4.4.5/scintilla/lexers/LexMetapost.cxx:185:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[100] ;
data/scite-4.4.5/scintilla/lexers/LexMetapost.cxx:363:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[100]="";
data/scite-4.4.5/scintilla/lexers/LexModula.cxx:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[3];
data/scite-4.4.5/scintilla/lexers/LexModula.cxx:340:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[BUFLEN];
data/scite-4.4.5/scintilla/lexers/LexModula.cxx:488:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						int base = atoi( buf );
data/scite-4.4.5/scintilla/lexers/LexNim.cxx:445:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char s[100];
data/scite-4.4.5/scintilla/lexers/LexNimrod.cxx:83:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100]; /* copy to lowercase and ignore underscores */
data/scite-4.4.5/scintilla/lexers/LexNsis.cxx:142:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[20]; // The key word we are looking for has atmost 13 characters
data/scite-4.4.5/scintilla/lexers/LexNsis.cxx:180:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[100];
data/scite-4.4.5/scintilla/lexers/LexOScript.cxx:94:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s[11];
data/scite-4.4.5/scintilla/lexers/LexOScript.cxx:137:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s[100];
data/scite-4.4.5/scintilla/lexers/LexOScript.cxx:152:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s[100];
data/scite-4.4.5/scintilla/lexers/LexOScript.cxx:418:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[7]; // Size of the longest possible keyword + null.
data/scite-4.4.5/scintilla/lexers/LexOScript.cxx:434:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[9];
data/scite-4.4.5/scintilla/lexers/LexPB.cxx:106:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char s[100];
data/scite-4.4.5/scintilla/lexers/LexPLM.cxx:100:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char word[1024];
data/scite-4.4.5/scintilla/lexers/LexPLM.cxx:157:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char word[1024];
data/scite-4.4.5/scintilla/lexers/LexPOV.cxx:113:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexPOV.cxx:134:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexPS.cxx:120:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char szradix[5];
data/scite-4.4.5/scintilla/lexers/LexPS.cxx:122:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    numRadix = atoi(szradix);
data/scite-4.4.5/scintilla/lexers/LexPS.cxx:149:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char s[100];
data/scite-4.4.5/scintilla/lexers/LexPascal.cxx:173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[100];
data/scite-4.4.5/scintilla/lexers/LexPascal.cxx:377:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[11];	// Size of the longest possible keyword + one additional character + null
data/scite-4.4.5/scintilla/lexers/LexPascal.cxx:422:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[100];
data/scite-4.4.5/scintilla/lexers/LexPascal.cxx:457:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s2[11];	// Size of the longest possible keyword + one additional character + null
data/scite-4.4.5/scintilla/lexers/LexPerl.cxx:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[100];
data/scite-4.4.5/scintilla/lexers/LexPerl.cxx:642:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char Delimiter[HERE_DELIM_MAX];	// the Delimiter
data/scite-4.4.5/scintilla/lexers/LexPerl.cxx:799:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexPowerPro.cxx:100:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char function[10] = "function "; //10 includes \0
data/scite-4.4.5/scintilla/lexers/LexPowerPro.cxx:142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s_save[100]; //for last line highlighting
data/scite-4.4.5/scintilla/lexers/LexPowerPro.cxx:150:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s[100];
data/scite-4.4.5/scintilla/lexers/LexPowerPro.cxx:187:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s[1000];
data/scite-4.4.5/scintilla/lexers/LexPowerPro.cxx:407:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szFirstWord[FIRST_WORD_MAX_LEN] = "";
data/scite-4.4.5/scintilla/lexers/LexPowerPro.cxx:410:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szDo[3]="";
data/scite-4.4.5/scintilla/lexers/LexPowerShell.cxx:67:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexPowerShell.cxx:114:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexProgress.cxx:57:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char marker[lengthMarker+1];
data/scite-4.4.5/scintilla/lexers/LexProgress.cxx:342:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char s[1000];
data/scite-4.4.5/scintilla/lexers/LexPython.cxx:595:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexR.cxx:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexRaku.cxx:1025:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[100];					// temp char string
data/scite-4.4.5/scintilla/lexers/LexRebol.cxx:156:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexRuby.cxx:103:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[MAX_KEYWORD_LENGTH];
data/scite-4.4.5/scintilla/lexers/LexRuby.cxx:715:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char Delimiter[256];	// the Delimiter, limit of 256: from Perl
data/scite-4.4.5/scintilla/lexers/LexRuby.cxx:738:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prevWord[MAX_KEYWORD_LENGTH + 1]; // 1 byte for zero
data/scite-4.4.5/scintilla/lexers/LexRuby.cxx:1614:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char prevWord[MAX_KEYWORD_LENGTH + 1];
data/scite-4.4.5/scintilla/lexers/LexRuby.cxx:1663:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char prevWord[MAX_KEYWORD_LENGTH + 1]; // 1 byte for zero
data/scite-4.4.5/scintilla/lexers/LexRuby.cxx:1816:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char prevWord[MAX_KEYWORD_LENGTH + 1]; // 1 byte for zero
data/scite-4.4.5/scintilla/lexers/LexRust.cxx:72:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const rustWordLists[NUM_RUST_KEYWORD_LISTS + 1] = {
data/scite-4.4.5/scintilla/lexers/LexRust.cxx:219:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s[MAX_RUST_IDENT_CHARS + 1];
data/scite-4.4.5/scintilla/lexers/LexSAS.cxx:68:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char s[1000];
data/scite-4.4.5/scintilla/lexers/LexSAS.cxx:84:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char s[1000];
data/scite-4.4.5/scintilla/lexers/LexSML.cxx:97:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char t[24];
data/scite-4.4.5/scintilla/lexers/LexSQL.cxx:465:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[1000];
data/scite-4.4.5/scintilla/lexers/LexSQL.cxx:531:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexSQL.cxx:778:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s[MAX_KW_LEN + 2];
data/scite-4.4.5/scintilla/lexers/LexSTTXT.cxx:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256] = { 0 };
data/scite-4.4.5/scintilla/lexers/LexSTTXT.cxx:268:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/scite-4.4.5/scintilla/lexers/LexScriptol.cxx:28:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[100] = "";
data/scite-4.4.5/scintilla/lexers/LexScriptol.cxx:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prevWord[200];
data/scite-4.4.5/scintilla/lexers/LexSmalltalk.cxx:165:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char num[256];
data/scite-4.4.5/scintilla/lexers/LexSmalltalk.cxx:181:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            radix = atoi(num + 1);
data/scite-4.4.5/scintilla/lexers/LexSmalltalk.cxx:183:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            radix = atoi(num);
data/scite-4.4.5/scintilla/lexers/LexSmalltalk.cxx:219:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ident[256];
data/scite-4.4.5/scintilla/lexers/LexSorcus.cxx:104:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char s[100];
data/scite-4.4.5/scintilla/lexers/LexSpecman.cxx:84:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexStata.cxx:65:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char s[1000];
data/scite-4.4.5/scintilla/lexers/LexTACL.cxx:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[100];
data/scite-4.4.5/scintilla/lexers/LexTACL.cxx:314:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexTADS3.cxx:271:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char s[250];
data/scite-4.4.5/scintilla/lexers/LexTAL.cxx:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[100];
data/scite-4.4.5/scintilla/lexers/LexTAL.cxx:303:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexTCL.cxx:148:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char w[100];
data/scite-4.4.5/scintilla/lexers/LexTCMD.cxx:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char wordBuffer[260];		// Word Buffer - large to catch long paths
data/scite-4.4.5/scintilla/lexers/LexTCMD.cxx:108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sKeywordBuffer[260] = "";	// Special Keyword Buffer
data/scite-4.4.5/scintilla/lexers/LexTCMD.cxx:404:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lineBuffer[16384];
data/scite-4.4.5/scintilla/lexers/LexTCMD.cxx:441:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[16] = "";
data/scite-4.4.5/scintilla/lexers/LexTeX.cxx:128:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lineBuffer[1024] ;
data/scite-4.4.5/scintilla/lexers/LexTeX.cxx:185:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[100] ;
data/scite-4.4.5/scintilla/lexers/LexTeX.cxx:390:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[100]="";
data/scite-4.4.5/scintilla/lexers/LexVB.cxx:96:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[100];
data/scite-4.4.5/scintilla/lexers/LexVB.cxx:235:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s[100];
data/scite-4.4.5/scintilla/lexers/LexVHDL.cxx:88:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char s[100];
data/scite-4.4.5/scintilla/lexers/LexVHDL.cxx:261:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char prevWord[32]     = "";
data/scite-4.4.5/scintilla/lexers/LexVHDL.cxx:286:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char s[32];
data/scite-4.4.5/scintilla/lexers/LexVHDL.cxx:384:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char s[32];
data/scite-4.4.5/scintilla/lexers/LexVerilog.cxx:502:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s[100];
data/scite-4.4.5/scintilla/lexers/LexVerilog.cxx:527:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char s[100];
data/scite-4.4.5/scintilla/lexers/LexVisualProlog.cxx:289:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char s[1000];
data/scite-4.4.5/scintilla/lexers/LexVisualProlog.cxx:310:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char s[1000];
data/scite-4.4.5/scintilla/lexers/LexVisualProlog.cxx:343:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char s[1000];
data/scite-4.4.5/scintilla/lexers/LexX12.cxx:104:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char m_chSegment[3]; // might be CRLF
data/scite-4.4.5/scintilla/lexers/LexX12.cxx:292:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Buf[6] = { 0 };
data/scite-4.4.5/scintilla/lexers/LexYAML.cxx:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[100];
data/scite-4.4.5/scintilla/lexers/LexYAML.cxx:206:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lineBuffer[1024] = "";
data/scite-4.4.5/scintilla/lexilla/test/LexillaAccess.cxx:47:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&fp, &function, sizeof(T));
data/scite-4.4.5/scintilla/lexilla/test/TestDocument.cxx:23:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const unsigned char UTF8BytesOfLead[256] = {
data/scite-4.4.5/scintilla/lexlib/LexAccessor.h:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[bufferSize+1];
data/scite-4.4.5/scintilla/lexlib/LexAccessor.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char styleBuf[bufferSize];
data/scite-4.4.5/scintilla/lexlib/OptionSet.h:46:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					bool option = atoi(val) != 0;
data/scite-4.4.5/scintilla/lexlib/OptionSet.h:54:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					int option = atoi(val);
data/scite-4.4.5/scintilla/lexlib/PropSetSimple.cxx:145:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(result, val.c_str(), n+1);
data/scite-4.4.5/scintilla/lexlib/PropSetSimple.cxx:154:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		return atoi(val.c_str());
data/scite-4.4.5/scintilla/lexlib/WordList.cxx:41:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char **keywords = new char *[words + 1];
data/scite-4.4.5/scintilla/lexlib/WordList.cxx:122:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(listTemp, s, lenS);
data/scite-4.4.5/scintilla/qt/ScintillaEditBase/PlatQt.cpp:1044:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			Append(startword, numword?atoi(numword + 1):-1);
data/scite-4.4.5/scintilla/qt/ScintillaEditBase/PlatQt.cpp:1054:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		Append(startword, numword?atoi(numword + 1):-1);
data/scite-4.4.5/scintilla/qt/ScintillaEditBase/PlatQt.cpp:1195:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char fontNameDefault[200] = "";
data/scite-4.4.5/scintilla/qt/ScintillaEditBase/PlatQt.cpp:1221:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[2000];
data/scite-4.4.5/scintilla/qt/ScintillaEditBase/PlatQt.cpp:1236:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[2000];
data/scite-4.4.5/scintilla/qt/ScintillaEditBase/ScintillaEditBase.cpp:623:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char fontName[64];
data/scite-4.4.5/scintilla/qt/ScintillaEditBase/ScintillaQt.cpp:550:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(folded, bytesFolded,  bytesFolded.length());
data/scite-4.4.5/scintilla/qt/ScintillaEditBase/ScintillaQt.cpp:573:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char sCharacter[2] = "A";
data/scite-4.4.5/scintilla/src/AutoComplete.cxx:167:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char item[maxItemLen];
data/scite-4.4.5/scintilla/src/AutoComplete.cxx:172:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(item, list + IndexSort.indices[sortMatrix[i] * 2], wordLen);
data/scite-4.4.5/scintilla/src/AutoComplete.cxx:197:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char value[maxItemLen];
data/scite-4.4.5/scintilla/src/AutoComplete.cxx:235:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char item[maxItemLen];
data/scite-4.4.5/scintilla/src/AutoComplete.cxx:282:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char item[maxItemLen];
data/scite-4.4.5/scintilla/src/CaseConvert.cxx:574:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char conversion[maxConversionLength+1];
data/scite-4.4.5/scintilla/src/CaseConvert.cxx:622:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char bytes[UTF8MaxBytes + 1]{};
data/scite-4.4.5/scintilla/src/CaseConvert.cxx:680:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lowerUTF8[UTF8MaxBytes+1];
data/scite-4.4.5/scintilla/src/CaseConvert.cxx:682:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char upperUTF8[UTF8MaxBytes+1];
data/scite-4.4.5/scintilla/src/CaseConvert.cxx:720:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char originUTF8[lenUTF8]{};
data/scite-4.4.5/scintilla/src/CaseConvert.cxx:721:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char foldedUTF8[lenUTF8]{};
data/scite-4.4.5/scintilla/src/CaseConvert.cxx:722:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char lowerUTF8[lenUTF8]{};
data/scite-4.4.5/scintilla/src/CaseConvert.cxx:723:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char upperUTF8[lenUTF8]{};
data/scite-4.4.5/scintilla/src/CaseFolder.h:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mapping[256];
data/scite-4.4.5/scintilla/src/CellBuffer.cxx:320:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&data[0], data_, lenData_);
data/scite-4.4.5/scintilla/src/CellBuffer.cxx:1104:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			const unsigned char back3[3] = {chBeforePrev, chPrev, chAt};
data/scite-4.4.5/scintilla/src/CellBuffer.cxx:1200:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					const unsigned char next3[3] = {ch, chNext,
data/scite-4.4.5/scintilla/src/CharClassify.h:26:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char charClass[maxChar];    // not type cc to save space
data/scite-4.4.5/scintilla/src/Document.cxx:642:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char charBytes[UTF8MaxBytes] = { leadByte, 0, 0, 0 };
data/scite-4.4.5/scintilla/src/Document.cxx:678:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char charBytes[UTF8MaxBytes] = {leadByte,0,0,0};
data/scite-4.4.5/scintilla/src/Document.cxx:779:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					unsigned char charBytes[UTF8MaxBytes] = {leadByte,0,0,0};
data/scite-4.4.5/scintilla/src/Document.cxx:861:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char charBytes[UTF8MaxBytes] = { leadByte, 0, 0, 0 };
data/scite-4.4.5/scintilla/src/Document.cxx:900:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				unsigned char charBytes[UTF8MaxBytes] = { 0, 0, 0, 0 };
data/scite-4.4.5/scintilla/src/Document.cxx:973:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				unsigned char charBytes[UTF8MaxBytes] = {leadByte,0,0,0};
data/scite-4.4.5/scintilla/src/Document.cxx:1984:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char charBytes[UTF8MaxBytes] = { leadByte, 0, 0, 0 };
data/scite-4.4.5/scintilla/src/Document.cxx:2053:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char bytes[UTF8MaxBytes + 1] = "";
data/scite-4.4.5/scintilla/src/Document.cxx:2054:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char folded[UTF8MaxBytes * maxFoldingExpansion + 1] = "";
data/scite-4.4.5/scintilla/src/Document.cxx:2112:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char bytes[maxBytesCharacter + 1];
data/scite-4.4.5/scintilla/src/Document.cxx:2119:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char folded[maxBytesCharacter * maxFoldingExpansion + 1];
data/scite-4.4.5/scintilla/src/Document.cxx:2145:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char folded[2];
data/scite-4.4.5/scintilla/src/Document.cxx:2871:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t buffered[2];
data/scite-4.4.5/scintilla/src/EditView.cxx:986:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char hexits[4] = "";
data/scite-4.4.5/scintilla/src/EditView.cxx:999:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(hexits, "x%2X", chEOL);
data/scite-4.4.5/scintilla/src/EditView.cxx:1964:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						const char cc[2] = { static_cast<char>(vsDraw.controlCharSymbol), '\0' };
data/scite-4.4.5/scintilla/src/Editor.cxx:218:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char c[2] = { static_cast<char>(j), 0 };
data/scite-4.4.5/scintilla/src/Editor.cxx:233:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			const char c1[3] = { '\xc2',  static_cast<char>(0x80+j), 0 };
data/scite-4.4.5/scintilla/src/Editor.cxx:243:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			const char hiByte[2] = {  static_cast<char>(k), 0 };
data/scite-4.4.5/scintilla/src/Editor.cxx:244:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char hexits[5];	// Really only needs 4 but that causes warning from gcc 7.1
data/scite-4.4.5/scintilla/src/Editor.cxx:245:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(hexits, "x%2X", k);
data/scite-4.4.5/scintilla/src/Editor.cxx:253:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				const char hiByte[2] = { ch, 0 };
data/scite-4.4.5/scintilla/src/Editor.cxx:254:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char hexits[5];	// Really only needs 4 but that causes warning from gcc 7.1
data/scite-4.4.5/scintilla/src/Editor.cxx:255:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(hexits, "x%2X", k);
data/scite-4.4.5/scintilla/src/Editor.cxx:1899:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[2];
data/scite-4.4.5/scintilla/src/Editor.cxx:3111:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char txt[2];
data/scite-4.4.5/scintilla/src/Editor.cxx:5592:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[3] = "\\?";
data/scite-4.4.5/scintilla/src/Editor.cxx:5599:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tagValue, text, length + 1);
data/scite-4.4.5/scintilla/src/Editor.cxx:5810:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ptr, val, len+1);
data/scite-4.4.5/scintilla/src/Editor.cxx:5822:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ptr, val, len);
data/scite-4.4.5/scintilla/src/Editor.cxx:5978:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(ptr, selectedText.Data(), iChar);
data/scite-4.4.5/scintilla/src/ExternalLexer.cxx:50:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&fp, &function, sizeof(T));
data/scite-4.4.5/scintilla/src/ExternalLexer.cxx:141:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char lexname[100] = "";
data/scite-4.4.5/scintilla/src/MarginView.cxx:380:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char number[100] = "";
data/scite-4.4.5/scintilla/src/MarginView.cxx:383:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
								sprintf(number, "%c%c %03X %03X",
data/scite-4.4.5/scintilla/src/MarginView.cxx:391:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
								sprintf(number, "%0X", state);
data/scite-4.4.5/scintilla/src/PerLine.cxx:420:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pa+sizeof(AnnotationHeader), text, pah->length);
data/scite-4.4.5/scintilla/src/PerLine.cxx:452:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(allocation.get() + sizeof(AnnotationHeader), annotations[line].get() + sizeof(AnnotationHeader), pahSource->length);
data/scite-4.4.5/scintilla/src/PerLine.cxx:458:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(annotations[line].get() + sizeof(AnnotationHeader) + pah->length, styles, pah->length);
data/scite-4.4.5/scintilla/src/PositionCache.cxx:682:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(positions.get(), other.positions.get(), lenData * sizeof(XYPOSITION));
data/scite-4.4.5/scintilla/src/PositionCache.cxx:697:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&positions[len], s_, len);
data/scite-4.4.5/scintilla/src/PositionCache.h:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bracePreviousStyles[2];
data/scite-4.4.5/scintilla/src/RESearch.h:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nfa[MAXNFA];    /* automaton */
data/scite-4.4.5/scintilla/src/RESearch.h:58:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char bittab[BITBLK]; /* bit table for CCL pre-set bits */
data/scite-4.4.5/scintilla/src/ScintillaBase.cxx:451:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(buffer, selected.c_str(), selected.length()+1);
data/scite-4.4.5/scintilla/src/UniConversion.h:32:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const unsigned char UTF8BytesOfLead[256];
data/scite-4.4.5/scintilla/src/ViewStyle.cxx:346:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char cc[2] = { static_cast<char>(controlCharSymbol), '\0' };
data/scite-4.4.5/scintilla/src/XPM.cxx:118:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	width = atoi(line0);
data/scite-4.4.5/scintilla/src/XPM.cxx:120:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	height = atoi(line0);
data/scite-4.4.5/scintilla/src/XPM.cxx:123:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nColours = atoi(line0);
data/scite-4.4.5/scintilla/src/XPM.cxx:125:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (atoi(line0) != 1) {
data/scite-4.4.5/scintilla/src/XPM.cxx:202:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				strings += atoi(line0);
data/scite-4.4.5/scintilla/src/XPM.cxx:205:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				strings += atoi(line0);
data/scite-4.4.5/scintilla/test/unit/UnitTester.cxx:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[2000];
data/scite-4.4.5/scintilla/test/unit/catch.hpp:956:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char timeStamp[timeStampSize];
data/scite-4.4.5/scintilla/test/unit/catch.hpp:3187:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        alignas(alignof(T)) char storage[sizeof(T)];
data/scite-4.4.5/scintilla/test/unit/catch.hpp:3644:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static char line[CATCH_CONFIG_CONSOLE_WIDTH] = {0};
data/scite-4.4.5/scintilla/test/unit/catch.hpp:3917:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        void open();
data/scite-4.4.5/scintilla/test/unit/catch.hpp:8281:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char **utf8Argv = new char *[ argc ];
data/scite-4.4.5/scintilla/test/unit/catch.hpp:8388:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char data[bufferSize];
data/scite-4.4.5/scintilla/test/unit/catch.hpp:8427:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        m_ofs.open( filename.c_str() );
data/scite-4.4.5/scintilla/test/unit/catch.hpp:8644:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( m_data, m_start, m_size );
data/scite-4.4.5/scintilla/test/unit/catch.hpp:9156:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    void TrackerBase::open() {
data/scite-4.4.5/scintilla/test/unit/catch.hpp:9245:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            open();
data/scite-4.4.5/scintilla/test/unit/catch.hpp:9284:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            tracker->open();
data/scite-4.4.5/scintilla/test/unit/catch.hpp:9557:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char asChar[sizeof (int)];
data/scite-4.4.5/scintilla/test/unit/catch.hpp:10175:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[maxDoubleSize];
data/scite-4.4.5/scintilla/test/unit/catch.hpp:10182:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buffer, "%.3f", duration);
data/scite-4.4.5/scintilla/test/unit/catch.hpp:10547:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            void open() {
data/scite-4.4.5/scintilla/test/unit/catch.hpp:10576:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                tp.open();
data/scite-4.4.5/scintilla/test/unit/catch.hpp:11155:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char timeStamp[timeStampSize];
data/scite-4.4.5/scintilla/test/unit/testCharClassify.cxx:71:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[2] = {0, 0};
data/scite-4.4.5/scintilla/test/unit/testCharClassify.cxx:89:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[2] = {0, 0};
data/scite-4.4.5/scintilla/test/unit/testUniConversion.cxx:112:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tbuf[1] = {0};
data/scite-4.4.5/scintilla/test/unit/testUniConversion.cxx:120:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tbuf[1] = {0};
data/scite-4.4.5/scintilla/test/unit/testUniConversion.cxx:128:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tbuf[1] = {0};
data/scite-4.4.5/scintilla/test/unit/testUniConversion.cxx:136:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tbuf[1] = {0};
data/scite-4.4.5/scintilla/test/unit/testUniConversion.cxx:144:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tbuf[2] = {0, 0};
data/scite-4.4.5/scintilla/test/unit/testUniConversion.cxx:153:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tbuf[4] = {};
data/scite-4.4.5/scintilla/test/unit/testUniConversion.cxx:164:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tbuf[2] = {};
data/scite-4.4.5/scintilla/test/unit/testUniConversion.cxx:173:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tbuf[4] = {};
data/scite-4.4.5/scintilla/test/unit/unitTest.cxx:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[2000];
data/scite-4.4.5/scintilla/win32/HanjaDic.cxx:108:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t conv[UTF8MaxBytes] = {0};
data/scite-4.4.5/scintilla/win32/PlatWin.cxx:450:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
			tlen = ::MultiByteToWideChar(codePage, 0, text.data(), static_cast<int>(text.length()),
data/scite-4.4.5/scintilla/win32/PlatWin.cxx:3477:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[2000];
data/scite-4.4.5/scintilla/win32/PlatWin.cxx:3498:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[2000] {};
data/scite-4.4.5/scintilla/win32/PlatWin.h:56:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&fp, &function, sizeof(T));
data/scite-4.4.5/scintilla/win32/ScintillaWin.cxx:742:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sCodePage[10];
data/scite-4.4.5/scintilla/win32/ScintillaWin.cxx:747:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return atoi(sCodePage);
data/scite-4.4.5/scintilla/win32/ScintillaWin.cxx:819:11:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
	return ::MultiByteToWideChar(codePage, 0, sv.data(), static_cast<int>(sv.length()), lpWideCharStr, static_cast<int>(cchWideChar));
data/scite-4.4.5/scintilla/win32/ScintillaWin.cxx:885:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(encoded, utf8, inputLength);
data/scite-4.4.5/scintilla/win32/ScintillaWin.cxx:1564:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t wcs[3] = { static_cast<wchar_t>(wParam), 0 };
data/scite-4.4.5/scintilla/win32/ScintillaWin.cxx:1586:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t wcs[3] = { 0 };
data/scite-4.4.5/scintilla/win32/ScintillaWin.cxx:2333:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t wFolded[20];
data/scite-4.4.5/scintilla/win32/ScintillaWin.cxx:2366:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char sCharacter[2] = "A";
data/scite-4.4.5/scintilla/win32/ScintillaWin.cxx:2368:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t wCharacter[20];
data/scite-4.4.5/scintilla/win32/ScintillaWin.cxx:2374:7:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						wchar_t wLower[20];
data/scite-4.4.5/scintilla/win32/ScintillaWin.cxx:2378:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char sCharacterLowered[20];
data/scite-4.4.5/scintilla/win32/ScintillaWin.cxx:2925:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rcFeedStart, &rcFeed[0], rcFeedLen);
data/scite-4.4.5/scite/gtk/DirectorExtension.cxx:94:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char requestPipeName[TMP_FILENAME_LENGTH];
data/scite-4.4.5/scite/gtk/DirectorExtension.cxx:146:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = open(pipeName, O_RDWR | O_NONBLOCK);
data/scite-4.4.5/scite/gtk/DirectorExtension.cxx:177:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char pipeData[8192];
data/scite-4.4.5/scite/gtk/DirectorExtension.cxx:236:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	IF_DEBUG(fdDebug = fopen("/tmp/SciTE.log", "w"))
data/scite-4.4.5/scite/gtk/DirectorExtension.cxx:398:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char pipeName[TMP_FILENAME_LENGTH];
data/scite-4.4.5/scite/gtk/DirectorExtension.cxx:410:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				fdCorrespondent = open(corresp,O_WRONLY | O_CREAT, S_IRWXU);
data/scite-4.4.5/scite/gtk/GUIGTK.cxx:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char number[32];
data/scite-4.4.5/scite/gtk/GUIGTK.cxx:41:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(number, "%0ld", i);
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:182:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				int fkeyNum = atoi(sKey.c_str());
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:1013:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char timeBuffer[200];
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:1177:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char converted[1000];
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:1834:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pageString[32];
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:1835:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(pageString, "%0d", page_nr + 1);
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:2578:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[8192];
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:5266:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char timestamp[14];
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:5297:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(uniqueInstance.c_str(), O_CREAT | O_EXCL, S_IRUSR | S_IWUSR); // Try to set the lock.
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:5319:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			int sendPipe = open(pipeFileName, O_WRONLY | O_NONBLOCK);
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:5461:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char selfExe[PATH_MAX] = "";
data/scite-4.4.5/scite/gtk/Widget.cxx:70:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return atoi(Text());
data/scite-4.4.5/scite/lua/src/lapi.c:1294:33:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (upisopen(*up1)) (*up1)->u.open.touched = 1;
data/scite-4.4.5/scite/lua/src/lauxlib.c:519:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(newbuff, B->b, B->n * sizeof(char));  /* copy original content */
data/scite-4.4.5/scite/lua/src/lauxlib.c:531:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(b, s, l * sizeof(char));
data/scite-4.4.5/scite/lua/src/lauxlib.c:638:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[BUFSIZ];  /* area for reading file */
data/scite-4.4.5/scite/lua/src/lauxlib.c:715:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    lf.f = fopen(filename, "r");
data/scite-4.4.5/scite/lua/src/lauxlib.h:153:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char initb[LUAL_BUFFERSIZE];  /* initial buffer */
data/scite-4.4.5/scite/lua/src/ldblib.c:382:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[5];
data/scite-4.4.5/scite/lua/src/ldblib.c:404:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[250];
data/scite-4.4.5/scite/lua/src/ldebug.c:630:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[LUA_IDSIZE];
data/scite-4.4.5/scite/lua/src/ldo.c:162:50:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  for (up = L->openupval; up != NULL; up = up->u.open.next)
data/scite-4.4.5/scite/lua/src/lfunc.c:66:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    pp = &p->u.open.next;
data/scite-4.4.5/scite/lua/src/lfunc.c:71:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  uv->u.open.next = *pp;  /* link it to list of open upvalues */
data/scite-4.4.5/scite/lua/src/lfunc.c:72:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  uv->u.open.touched = 1;
data/scite-4.4.5/scite/lua/src/lfunc.c:87:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    L->openupval = uv->u.open.next;  /* remove from 'open' list */
data/scite-4.4.5/scite/lua/src/lfunc.h:42:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    } open;
data/scite-4.4.5/scite/lua/src/lgc.c:323:59:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      for (uv = thread->openupval; uv != NULL; uv = uv->u.open.next) {
data/scite-4.4.5/scite/lua/src/lgc.c:324:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (uv->u.open.touched) {
data/scite-4.4.5/scite/lua/src/lgc.c:326:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          uv->u.open.touched = 0;
data/scite-4.4.5/scite/lua/src/lgc.c:521:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        uv->u.open.touched = 1;  /* can be marked in 'remarkupvals' */
data/scite-4.4.5/scite/lua/src/liolib.c:245:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  p->f = fopen(fname, mode);
data/scite-4.4.5/scite/lua/src/liolib.c:257:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  p->f = fopen(filename, mode);
data/scite-4.4.5/scite/lua/src/liolib.c:283:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  p->f = tmpfile();
data/scite-4.4.5/scite/lua/src/liolib.c:389:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[L_MAXLENNUM + 1];  /* +1 for ending '\0' */
data/scite-4.4.5/scite/lua/src/liolib.c:439:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char decp[2];
data/scite-4.4.5/scite/lua/src/llex.c:346:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[UTF8BUFFSZ];
data/scite-4.4.5/scite/lua/src/loadlib.c:169:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[MAX_PATH + 1];
data/scite-4.4.5/scite/lua/src/loadlib.c:187:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[128];
data/scite-4.4.5/scite/lua/src/loadlib.c:417:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f = fopen(filename, "r");  /* try to open file */
data/scite-4.4.5/scite/lua/src/lobject.c:282:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff[L_MAXLENNUM + 1];
data/scite-4.4.5/scite/lua/src/lobject.c:372:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[MAXNUMBER2STR];
data/scite-4.4.5/scite/lua/src/lobject.c:437:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buff[4*sizeof(void *) + 8]; /* should be enough space for a '%p' */
data/scite-4.4.5/scite/lua/src/lobject.c:443:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buff[UTF8BUFFSZ];
data/scite-4.4.5/scite/lua/src/lobject.c:484:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define addstr(a,b,l)	( memcpy(a,b,(l) * sizeof(char)), a += (l) )
data/scite-4.4.5/scite/lua/src/lobject.c:490:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(out, source + 1, l * sizeof(char));
data/scite-4.4.5/scite/lua/src/lobject.c:498:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(out, source + 1, l * sizeof(char));
data/scite-4.4.5/scite/lua/src/lobject.c:502:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(out, source + 1 + l - bufflen, bufflen * sizeof(char));
data/scite-4.4.5/scite/lua/src/lobject.c:518:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, POS, (LL(POS) + 1) * sizeof(char));
data/scite-4.4.5/scite/lua/src/lopcodes.c:20:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LUAI_DDEF const char *const luaP_opnames[NUM_OPCODES+1] = {
data/scite-4.4.5/scite/lua/src/lopcodes.h:290:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LUAI_DDEC const char *const luaP_opnames[NUM_OPCODES+1];  /* opcode names */
data/scite-4.4.5/scite/lua/src/loslib.c:123:13:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
        e = mkstemp(b); \
data/scite-4.4.5/scite/lua/src/loslib.c:167:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[LUA_TMPNAMBUFSIZE];
data/scite-4.4.5/scite/lua/src/loslib.c:268:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buff, conv, oplen);  /* copy valid option to buffer */
data/scite-4.4.5/scite/lua/src/loslib.c:302:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cc[4];  /* buffer for individual conversion specifiers */
data/scite-4.4.5/scite/lua/src/lstate.c:79:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(b + p, &t, sizeof(t)); p += sizeof(t); }
data/scite-4.4.5/scite/lua/src/lstate.c:82:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[4 * sizeof(size_t)];
data/scite-4.4.5/scite/lua/src/lstate.c:276:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(lua_getextraspace(L1), lua_getextraspace(g->mainthread),
data/scite-4.4.5/scite/lua/src/lstring.c:187:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(getstr(ts), str, l * sizeof(char));
data/scite-4.4.5/scite/lua/src/lstring.c:207:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(getstr(ts), str, l * sizeof(char));
data/scite-4.4.5/scite/lua/src/lstrlib.c:135:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p, s, l * sizeof(char)); p += l;
data/scite-4.4.5/scite/lua/src/lstrlib.c:137:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, sep, lsep * sizeof(char));
data/scite-4.4.5/scite/lua/src/lstrlib.c:141:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, s, l * sizeof(char));  /* last copy (not followed by separator) */
data/scite-4.4.5/scite/lua/src/lstrlib.c:916:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buff[10];
data/scite-4.4.5/scite/lua/src/lstrlib.c:996:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(form, strfrmt, ((p - strfrmt) + 1) * sizeof(char));
data/scite-4.4.5/scite/lua/src/lstrlib.c:1030:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char form[MAX_FORMAT];  /* to store the format ('%...') */
data/scite-4.4.5/scite/lua/src/lstrlib.c:1146:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[5 * sizeof(lua_Number)];  /* enough for any float type */
data/scite-4.4.5/scite/lua/src/ltablib.c:263:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buff, &c, sof(c) * sizeof(unsigned int));
data/scite-4.4.5/scite/lua/src/ltablib.c:264:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buff + sof(c), &t, sof(t) * sizeof(unsigned int));
data/scite-4.4.5/scite/lua/src/ltm.c:29:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LUAI_DDEF const char *const luaT_typenames_[LUA_TOTALTAGS] = {
data/scite-4.4.5/scite/lua/src/ltm.h:55:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LUAI_DDEC const char *const luaT_typenames_[LUA_TOTALTAGS];
data/scite-4.4.5/scite/lua/src/lua.h:454:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char short_src[LUA_IDSIZE]; /* (S) */
data/scite-4.4.5/scite/lua/src/lundump.c:95:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff[LUAI_MAXSHORTLEN];
data/scite-4.4.5/scite/lua/src/lundump.c:220:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[sizeof(LUA_SIGNATURE) + sizeof(LUAC_DATA)]; /* larger than both */
data/scite-4.4.5/scite/lua/src/lvm.c:464:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buff + tl, svalue(top - n), l * sizeof(char));
data/scite-4.4.5/scite/lua/src/lvm.c:498:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buff[LUAI_MAXSHORTLEN];
data/scite-4.4.5/scite/lua/src/lzio.c:60:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(b, z->p, m);
data/scite-4.4.5/scite/src/ExportPDF.cxx:100:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char val[20] = "";
data/scite-4.4.5/scite/src/ExportPDF.cxx:104:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(val, "%d ", c / 1000);
data/scite-4.4.5/scite/src/ExportPDF.cxx:106:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(val, "0.%03d ", c);
data/scite-4.4.5/scite/src/ExportPDF.cxx:137:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char val[20];
data/scite-4.4.5/scite/src/ExportPDF.cxx:138:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(val, "%d", objectData);
data/scite-4.4.5/scite/src/ExportPDF.cxx:153:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char val[32] = "";
data/scite-4.4.5/scite/src/ExportPDF.cxx:162:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(val, "%010ld 00000 n \n", offsetList[i]);
data/scite-4.4.5/scite/src/ExportPDF.cxx:185:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer[250];
data/scite-4.4.5/scite/src/ExportPDF.cxx:227:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char fontSpec[100];
data/scite-4.4.5/scite/src/ExportPDF.cxx:228:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(fontSpec, "/F%d %d Tf ",
data/scite-4.4.5/scite/src/ExportPDF.cxx:288:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(buffer, "<</Type/Page/Parent %d 0 R\n"
data/scite-4.4.5/scite/src/ExportPDF.cxx:299:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(buffer, "%d 0 R\n", pageObjectStart + j);
data/scite-4.4.5/scite/src/ExportPDF.cxx:302:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buffer, "]/Count %d\n>>\n", pageCount);
data/scite-4.4.5/scite/src/ExportPDF.cxx:306:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buffer, "<</Type/Catalog/Pages %d 0 R >>\n", pagesRef);
data/scite-4.4.5/scite/src/ExportPDF.cxx:311:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buffer, "trailer\n<< /Size %d /Root %d 0 R\n>>"
data/scite-4.4.5/scite/src/ExportPDF.cxx:365:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buffer, "BT 1 0 0 1 %d %d Tm\n",
data/scite-4.4.5/scite/src/ExportPDF.cxx:413:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(buffer, "0 -%d.%d TD\n", f / 10, f % 10);
data/scite-4.4.5/scite/src/ExportPDF.cxx:416:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(buffer, "T*\n");
data/scite-4.4.5/scite/src/ExportPDF.cxx:445:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[200] = "";
data/scite-4.4.5/scite/src/ExportPDF.cxx:448:27:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (0 >= (pr.pageWidth = atol(buffer))) {
data/scite-4.4.5/scite/src/ExportPDF.cxx:452:28:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (0 >= (pr.pageHeight = atol(buffer))) {
data/scite-4.4.5/scite/src/ExportPDF.cxx:459:50:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (0 >= (pr.pageMargin.left = static_cast<int>(atol(buffer)))) {
data/scite-4.4.5/scite/src/ExportPDF.cxx:463:51:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (0 >= (pr.pageMargin.right = static_cast<int>(atol(buffer)))) {
data/scite-4.4.5/scite/src/ExportPDF.cxx:467:49:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (0 >= (pr.pageMargin.top = static_cast<int>(atol(buffer)))) {
data/scite-4.4.5/scite/src/ExportPDF.cxx:471:52:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (0 >= (pr.pageMargin.bottom = static_cast<int>(atol(buffer)))) {
data/scite-4.4.5/scite/src/ExportRTF.cxx:97:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(control, *style, len);
data/scite-4.4.5/scite/src/ExportRTF.cxx:104:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lastControl[MAX_STYLEDEF] = "";
data/scite-4.4.5/scite/src/ExportRTF.cxx:105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char currentControl[MAX_STYLEDEF] = "";
data/scite-4.4.5/scite/src/ExportRTF.cxx:269:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char u8Char[5] = "";
data/scite-4.4.5/scite/src/ExportTEX.cxx:62:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(texcolor, "%d.%d, %d.%d, %d.%d", r / 10, r % 10, g / 10, g % 10, b / 10, b % 10);
data/scite-4.4.5/scite/src/ExportTEX.cxx:68:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[10];
data/scite-4.4.5/scite/src/ExportTEX.cxx:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rgb[200] = "";
data/scite-4.4.5/scite/src/FilePath.cxx:242:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
static FILE *fopen(const wchar_t *filename, const wchar_t *mode) noexcept {
data/scite-4.4.5/scite/src/FilePath.cxx:411:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		return fopen(fileName.c_str(), mode);
data/scite-4.4.5/scite/src/FilePath.cxx:711:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer[8 * 1024];
data/scite-4.4.5/scite/src/FilePath.cxx:741:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer[16 * 1024];
data/scite-4.4.5/scite/src/FileWorker.cxx:134:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&data[0], documentBytes+i, grabSize);
data/scite-4.4.5/scite/src/JobQueue.cxx:140:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		saveBefore = atoi(props.GetNewExpandString(propName.c_str(), fileNameExt).c_str());
data/scite-4.4.5/scite/src/JobQueue.cxx:171:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		repSel = atoi(props.GetNewExpandString(propName.c_str(), fileNameExt).c_str());
data/scite-4.4.5/scite/src/LexillaLibrary.cxx:60:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&fp, &function, sizeof(T));
data/scite-4.4.5/scite/src/LexillaLibrary.cxx:68:24:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
	const int cchWide = ::MultiByteToWideChar(CP_UTF8, 0, sv.data(), sLength, nullptr, 0);
data/scite-4.4.5/scite/src/LexillaLibrary.cxx:70:4:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
	::MultiByteToWideChar(CP_UTF8, 0, sv.data(), sLength, &sWide[0], cchWide);
data/scite-4.4.5/scite/src/LuaExtension.cxx:87:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			propVal = atoi(sPropVal.c_str());
data/scite-4.4.5/scite/src/LuaExtension.cxx:1719:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char chs[2] = {ch, '\0'};
data/scite-4.4.5/scite/src/LuaExtension.cxx:1746:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cursor[3][8];
data/scite-4.4.5/scite/src/LuaExtension.cxx:1822:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor[nextSlot], "\0\0\0\0\0\0\0\0", 8);
data/scite-4.4.5/scite/src/LuaExtension.cxx:1867:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor[0], "\0\0\0\0\0\0\0\0", 8);
data/scite-4.4.5/scite/src/LuaExtension.cxx:1868:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor[1], "\0\0\0\0\0\0\0\0", 8);
data/scite-4.4.5/scite/src/LuaExtension.cxx:1869:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cursor[2], "\0\0\0\0\0\0\0\0", 8);
data/scite-4.4.5/scite/src/LuaExtension.cxx:1907:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cursor[0], "\0\0\0\0\0\0\0\0", 8);
data/scite-4.4.5/scite/src/LuaExtension.cxx:1908:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cursor[1], "\0\0\0\0\0\0\0\0", 8);
data/scite-4.4.5/scite/src/LuaExtension.cxx:1909:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cursor[2], "\0\0\0\0\0\0\0\0", 8);
data/scite-4.4.5/scite/src/PropSetFile.cxx:229:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				const int value = atoi(val);
data/scite-4.4.5/scite/src/SciTEBase.cxx:322:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	sw.styleNumber = atoi(sAndW.c_str());
data/scite-4.4.5/scite/src/SciTEBase.cxx:401:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char word[32] = "";
data/scite-4.4.5/scite/src/SciTEBase.cxx:2331:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sbKey[32];
data/scite-4.4.5/scite/src/SciTEBase.cxx:2332:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sbKey, "statusbar.text.%d", sbNum);
data/scite-4.4.5/scite/src/SciTEBase.cxx:4337:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			macrosEnabled = atoi(arg);
data/scite-4.4.5/scite/src/SciTEBase.cxx:4342:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			MenuCommand(atoi(arg));
data/scite-4.4.5/scite/src/SciTEBase.cxx:4546:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char params[4] = "";
data/scite-4.4.5/scite/src/SciTEBuffers.cxx:819:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		wEditor.SetUseTabs(atoi(useTabsChars.c_str()));
data/scite-4.4.5/scite/src/SciTEBuffers.cxx:826:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		wEditor.SetTabWidth(atoi(tabSizeForExt.c_str()));
data/scite-4.4.5/scite/src/SciTEBuffers.cxx:833:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		wEditor.SetIndent(atoi(indentSizeForExt.c_str()));
data/scite-4.4.5/scite/src/SciTEBuffers.cxx:2016:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						if (atoi(cTag.c_str()) > 0) {
data/scite-4.4.5/scite/src/SciTEIO.cxx:692:17:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			lineNumber = atol(selName.c_str() + endPath + 1);
data/scite-4.4.5/scite/src/SciTEIO.cxx:696:18:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				lineNumber = atol(selName.c_str() + endPath + 1);
data/scite-4.4.5/scite/src/SciTEIO.cxx:1227:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char timeBuff[15];
data/scite-4.4.5/scite/src/SciTEIO.cxx:1348:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[8 * 1024] {};
data/scite-4.4.5/scite/src/SciTEIO.cxx:1369:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[bufLen];
data/scite-4.4.5/scite/src/SciTEProps.cxx:129:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char key[1024] = "";
data/scite-4.4.5/scite/src/SciTEProps.cxx:133:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(key, k, v - k);
data/scite-4.4.5/scite/src/SciTEProps.cxx:268:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[200];
data/scite-4.4.5/scite/src/SciTEProps.cxx:289:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char key[200];
data/scite-4.4.5/scite/src/SciTEProps.cxx:330:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char key[200];
data/scite-4.4.5/scite/src/SciTEProps.cxx:742:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			int subStyleIdentifiers = atoi(ssNumber.c_str());
data/scite-4.4.5/scite/src/SciTEProps.cxx:874:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		wEditor.SetCaretPeriod(atoi(caretPeriod.c_str()));
data/scite-4.4.5/scite/src/SciTEProps.cxx:875:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		wOutput.SetCaretPeriod(atoi(caretPeriod.c_str()));
data/scite-4.4.5/scite/src/SciTEProps.cxx:973:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bracesStyleKey[200];
data/scite-4.4.5/scite/src/SciTEProps.cxx:977:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[200] = "";
data/scite-4.4.5/scite/src/SciTEProps.cxx:1058:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	lineNumbersWidth = atoi(lineMarginProp.c_str());
data/scite-4.4.5/scite/src/SciTEProps.cxx:1096:75:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	indentExamine = viewIndentExamine.length() ? static_cast<SA::IndentView>(atoi(viewIndentExamine.c_str())) : SA::IndentView::Real;
data/scite-4.4.5/scite/src/SciTEProps.cxx:1107:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		stripTrailingSpaces = atoi(useStripTrailingSpaces.c_str()) != 0;
data/scite-4.4.5/scite/src/SciTEProps.cxx:1116:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	indentMaintain = atoi(props.GetNewExpandString("indent.maintain.", fileNameForExtension.c_str()).c_str());
data/scite-4.4.5/scite/src/SciTEProps.cxx:1119:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	statementLookback = atoi(lookback.c_str());
data/scite-4.4.5/scite/src/SciTEProps.cxx:1484:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[200] = "";
data/scite-4.4.5/scite/src/SciTEProps.cxx:1489:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char propStr[256] = "";
data/scite-4.4.5/scite/src/SciTEProps.cxx:1491:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(key, "style.lpeg.%0d", i);
data/scite-4.4.5/scite/src/SciTEProps.cxx:1812:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return atoi(commandName.c_str());
data/scite-4.4.5/scite/src/StringHelpers.cxx:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char number[32];
data/scite-4.4.5/scite/src/StringHelpers.cxx:86:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(number, "%.*f", precision, d);
data/scite-4.4.5/scite/src/StyleWriter.h:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[bufferSize+1];
data/scite-4.4.5/scite/src/StyleWriter.h:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char styleBuf[bufferSize];
data/scite-4.4.5/scite/src/Utf8_16.cxx:89:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pbufPrependSurrogate, m_leadSurrogate, 2);
data/scite-4.4.5/scite/src/Utf8_16.cxx:91:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pbufPrependSurrogate + 2, m_pBuf + nSkip, len - nSkip);
data/scite-4.4.5/scite/src/Utf8_16.cxx:105:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(m_leadSurrogate, endSurrogate, 2);
data/scite-4.4.5/scite/src/scite_lua_win.h:20:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define fopen scite_lua_fopen
data/scite-4.4.5/scite/win32/DLLFunction.h:21:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&fp, &function, sizeof(T));
data/scite-4.4.5/scite/win32/GUIWin.cxx:181:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char number[32];
data/scite-4.4.5/scite/win32/GUIWin.cxx:182:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(number, "%0lx", i);
data/scite-4.4.5/scite/win32/SciTEWin.cxx:81:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				const int fkeyNum = atoi(sKey.c_str());
data/scite-4.4.5/scite/win32/SciTEWin.cxx:86:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				const int vkey = atoi(sKey.c_str());
data/scite-4.4.5/scite/win32/SciTEWin.cxx:92:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					const int keyNum = atoi(sKey.c_str());
data/scite-4.4.5/scite/win32/SciTEWin.cxx:360:25:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
		const int cchWide = ::MultiByteToWideChar(codePage, 0, s.c_str(), sLength, nullptr, 0);
data/scite-4.4.5/scite/win32/SciTEWin.cxx:362:5:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
		::MultiByteToWideChar(codePage, 0, s.c_str(), sLength, &sWide[0], cchWide);
data/scite-4.4.5/scite/win32/SciTEWin.cxx:439:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			f = fopen(filename, mode);
data/scite-4.4.5/scite/win32/SciTEWin.cxx:642:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ptr, rtf.c_str(), len);
data/scite-4.4.5/scite/win32/SciTEWin.cxx:662:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ptr, clipText.c_str(), blobSize);
data/scite-4.4.5/scite/win32/SciTEWin.cxx:1457:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char val[32] = "";
data/scite-4.4.5/scite/win32/SciTEWin.cxx:1460:25:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	pagesetupMargin.left = atol(val);
data/scite-4.4.5/scite/win32/SciTEWin.cxx:1462:26:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	pagesetupMargin.right = atol(val);
data/scite-4.4.5/scite/win32/SciTEWin.cxx:1464:24:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	pagesetupMargin.top = atol(val);
data/scite-4.4.5/scite/win32/SciTEWin.cxx:1466:27:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	pagesetupMargin.bottom = atol(val);
data/scite-4.4.5/scite/win32/SciTEWin.cxx:1972:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buff[200] = "";
data/scite-4.4.5/scite/win32/SciTEWin.cxx:1974:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(buff, "Memory exhausted.");
data/scite-4.4.5/scite/win32/SciTEWin.cxx:1976:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buff, "Scintilla failed with status %d.", static_cast<int>(statusFailure));
data/scite-4.4.5/scite/win32/SciTEWin.cxx:1978:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(buff, " SciTE will now close.");
data/scite-4.4.5/scite/win32/SciTEWinBar.cxx:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char temp[TEMP_LEN] = "";
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:39:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		soundFreq = atoi(sound);	// May be a frequency, not a filename
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char flashDuration[10] = "";
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sound[_MAX_PATH] = "";
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char soundDuration[10] = "";
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:115:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int flashLen = atoi(flashDuration);
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:119:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	PlayThisSound(sound, atoi(soundDuration), hMM);
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:517:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		TCHAR localeInfo[3];
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:658:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char pageString[32];
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:659:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(pageString, "%0d", pageNum);
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:907:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pSearcher->findStyle = atoi(ItemTextU(IDFINDSTYLE).c_str());
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:1280:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				TCHAR szDisplayName[MAX_PATH] = TEXT("");
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:1300:6:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					TCHAR szDir[MAX_PATH];
data/scite-4.4.5/scintilla/gtk/PlatGTK.cxx:809:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						pango_layout_set_text(layout, utfForm.c_str(), strlen(utfForm.c_str()));
data/scite-4.4.5/scintilla/gtk/PlatGTK.cxx:812:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						ClusterIterator iti(layout, strlen(utfForm.c_str()));
data/scite-4.4.5/scintilla/gtk/PlatGTK.cxx:1721:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t len = strlen(s);
data/scite-4.4.5/scintilla/gtk/PlatGTK.cxx:1813:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (s && (0 == strncmp(prefix, s, strlen(prefix)))) {
data/scite-4.4.5/scintilla/gtk/PlatGTK.cxx:1887:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t count = strlen(listText) + 1;
data/scite-4.4.5/scintilla/gtk/ScintillaGTK.cxx:420:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		validUTF8 = g_utf8_validate(str, strlen(str), nullptr);
data/scite-4.4.5/scintilla/gtk/ScintillaGTK.cxx:421:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		uniStr = g_utf8_to_ucs4_fast(str, strlen(str), &uniStrLen);
data/scite-4.4.5/scintilla/gtk/ScintillaGTK.cxx:452:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (strlen(pes.str) > 0) {
data/scite-4.4.5/scintilla/gtk/ScintillaGTK.cxx:781:79:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const Sci::Position inputLength = (lengthForEncode >= 0) ? lengthForEncode : strlen(utf8);
data/scite-4.4.5/scintilla/gtk/ScintillaGTK.cxx:1134:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				size_t lenMapped = strlen(mapped);
data/scite-4.4.5/scintilla/gtk/ScintillaGTK.cxx:1170:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							std::string mappedBack = ConvertText(mapped, strlen(mapped),
data/scite-4.4.5/scintilla/gtk/ScintillaGTK.cxx:1227:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		return std::string(mapper.mapped, strlen(mapper.mapped));
data/scite-4.4.5/scintilla/gtk/ScintillaGTK.cxx:1233:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		return ConvertText(mapper.mapped, strlen(mapper.mapped), charSetBuffer, "UTF-8", false);
data/scite-4.4.5/scintilla/gtk/ScintillaGTK.cxx:2176:84:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const int lengthInserted = pdoc->InsertString(CurrentPosition(), event->string, strlen(event->string));
data/scite-4.4.5/scintilla/gtk/ScintillaGTK.cxx:2284:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const glong charactersLen = g_utf8_strlen(u8Str, strlen(u8Str));
data/scite-4.4.5/scintilla/gtk/ScintillaGTK.cxx:2354:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		gunichar *uniStr = g_utf8_to_ucs4_fast(commitStr, strlen(commitStr), &uniStrLen);
data/scite-4.4.5/scintilla/gtk/ScintillaGTK.cxx:2455:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(pes.str) > 0) {
data/scite-4.4.5/scintilla/gtk/ScintillaGTKAccessible.cxx:751:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				size_t len = strlen(text);
data/scite-4.4.5/scintilla/lexers/LexAU3.cxx:242:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int tp = static_cast<int>(strlen(s_save));
data/scite-4.4.5/scintilla/lexers/LexAU3.cxx:475:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					else if (strlen(sk) == 3)
data/scite-4.4.5/scintilla/lexers/LexAU3.cxx:626:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			else if (strlen(sk) == 3)
data/scite-4.4.5/scintilla/lexers/LexBash.cxx:695:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					if (s[strlen(s) - 1] == '\r')
data/scite-4.4.5/scintilla/lexers/LexBash.cxx:696:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						s[strlen(s) - 1] = '\0';
data/scite-4.4.5/scintilla/lexers/LexBatch.cxx:70:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(strBuffer, lineBuffer, endPos);
data/scite-4.4.5/scintilla/lexers/LexCPP.cxx:957:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						size_t lenS = strlen(s);
data/scite-4.4.5/scintilla/lexers/LexCaml.cxx:136:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int n = strlen(LexerName);
data/scite-4.4.5/scintilla/lexers/LexCmake.cxx:142:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( strlen(word) > 3 ) {
data/scite-4.4.5/scintilla/lexers/LexCmake.cxx:143:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ( word[1] == '{' && word[strlen(word)-1] == '}' )
data/scite-4.4.5/scintilla/lexers/LexDMAP.cxx:208:13:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
            strcpy(prevWord, "");
data/scite-4.4.5/scintilla/lexers/LexDMIS.cxx:121:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		totalLen += strlen(DMISWordListDesc[i]);
data/scite-4.4.5/scintilla/lexers/LexDMIS.cxx:131:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(this->m_wordListSets, "\n");
data/scite-4.4.5/scintilla/lexers/LexDMIS.cxx:253:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy(tmpStr, this->UpperCase(tmpStr), (MAX_STR_LEN-1));
data/scite-4.4.5/scintilla/lexers/LexECL.cxx:178:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						int i = static_cast<int>(strlen(s)) - 1;
data/scite-4.4.5/scintilla/lexers/LexECL.cxx:183:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
						strncpy(s2, s, i + 1);
data/scite-4.4.5/scintilla/lexers/LexEScript.cxx:253:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(prevWord, "");
data/scite-4.4.5/scintilla/lexers/LexErrorList.cxx:33:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return strncmp(haystack, needle, strlen(needle)) == 0;
data/scite-4.4.5/scintilla/lexers/LexFortran.cxx:679:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(prevWord, "");
data/scite-4.4.5/scintilla/lexers/LexHaskell.cxx:571:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            sc.Forward(static_cast<int>(strlen("\\begin{code}")));
data/scite-4.4.5/scintilla/lexers/LexHaskell.cxx:592:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         sc.Forward(static_cast<int>(strlen("\\end{code}")));
data/scite-4.4.5/scintilla/lexers/LexLaTeX.cxx:156:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	Sci_PositionU l = static_cast<Sci_PositionU>(strlen(needle));
data/scite-4.4.5/scintilla/lexers/LexMagik.cxx:234:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	                sc.Forward(static_cast<int>(strlen(keyword)));
data/scite-4.4.5/scintilla/lexers/LexMagik.cxx:337:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strlen(keyword) > 3 &&
data/scite-4.4.5/scintilla/lexers/LexModula.cxx:65:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if( ( strlen( op.WordAt(i) ) == 2 ) &&
data/scite-4.4.5/scintilla/lexers/LexModula.cxx:72:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if( ( strlen( op.WordAt(i) ) == 1 ) &&
data/scite-4.4.5/scintilla/lexers/LexModula.cxx:93:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = static_cast<int>(strlen( stt ));
data/scite-4.4.5/scintilla/lexers/LexModula.cxx:114:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = static_cast<int>(strlen( stt ));
data/scite-4.4.5/scintilla/lexers/LexNsis.cxx:238:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strlen(s) > 3 )
data/scite-4.4.5/scintilla/lexers/LexNsis.cxx:240:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if( s[1] == '{' && s[strlen(s)-1] == '}' )
data/scite-4.4.5/scintilla/lexers/LexPowerPro.cxx:156:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int tp = static_cast<int>(strlen(s_save));
data/scite-4.4.5/scintilla/lexers/LexRuby.cxx:151:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((pos + static_cast<int>(strlen(val))) >= lengthDoc) {
data/scite-4.4.5/scintilla/lexers/LexTCL.cxx:151:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (w[strlen(w)-1]=='\r')
data/scite-4.4.5/scintilla/lexers/LexTCL.cxx:152:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					w[strlen(w)-1]=0;
data/scite-4.4.5/scintilla/lexers/LexTCL.cxx:165:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					} else if (sc.GetRelative(-static_cast<int>(strlen(s))-1) == '{' &&
data/scite-4.4.5/scintilla/lexers/LexTCMD.cxx:253:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				wbo = (Sci_PositionU)strlen( sKeywordBuffer );
data/scite-4.4.5/scintilla/lexers/LexTeX.cxx:223:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						k = static_cast<int>(strlen(key)) ;
data/scite-4.4.5/scintilla/lexers/LexVB.cxx:99:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					s[strlen(s) - 1] = '\0';
data/scite-4.4.5/scintilla/lexers/LexVB.cxx:238:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			s[strlen(s) - 1] = '\0';
data/scite-4.4.5/scintilla/lexers/LexVHDL.cxx:300:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for(j=j+static_cast<Sci_PositionU>(strlen(prevWord)); j<endPos; j++)
data/scite-4.4.5/scintilla/lexers/LexVHDL.cxx:308:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(prevWord, ";");
data/scite-4.4.5/scintilla/lexers/LexVHDL.cxx:375:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(prevWord, ";");
data/scite-4.4.5/scintilla/lexers/LexYAML.cxx:60:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(s, lineBuffer, len);
data/scite-4.4.5/scintilla/lexilla/src/Lexilla.cxx:319:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (static_cast<size_t>(buflength) > strlen(lexerName)) {
data/scite-4.4.5/scintilla/lexlib/LexerBase.cxx:65:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		props.Set(key, val, strlen(key), strlen(val));
data/scite-4.4.5/scintilla/lexlib/LexerBase.cxx:65:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		props.Set(key, val, strlen(key), strlen(val));
data/scite-4.4.5/scintilla/lexlib/SparseState.h:85:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
			different = !std::equal(low, states.end(), other.states.begin());
data/scite-4.4.5/scintilla/lexlib/WordList.cxx:120:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t lenS = strlen(s) + 1;
data/scite-4.4.5/scintilla/lexlib/WordList.cxx:272:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					const size_t suffixLengthA = strlen(a);
data/scite-4.4.5/scintilla/lexlib/WordList.cxx:273:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					const size_t suffixLengthB = strlen(b);
data/scite-4.4.5/scintilla/lexlib/WordList.cxx:291:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const size_t suffixLengthA = strlen(a);
data/scite-4.4.5/scintilla/lexlib/WordList.cxx:292:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const size_t suffixLengthB = strlen(b);
data/scite-4.4.5/scintilla/qt/ScintillaEditBase/PlatQt.cpp:988:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(value, bytes.constData(), len);
data/scite-4.4.5/scintilla/qt/ScintillaEditBase/PlatQt.cpp:1034:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t count = strlen(list) + 1;
data/scite-4.4.5/scintilla/qt/ScintillaEditBase/PlatQt.cpp:1243:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(buffer, "\n");
data/scite-4.4.5/scintilla/src/AutoComplete.cxx:229:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t lenWord = strlen(word);
data/scite-4.4.5/scintilla/src/Editor.cxx:1065:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		pdoc->InsertString(pdoc->Length(), eol, strlen(eol));
data/scite-4.4.5/scintilla/src/Editor.cxx:1070:101:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		const Sci::Position lengthInserted = pdoc->InsertString(CurrentPosition() + selectionLength, eol, strlen(eol));
data/scite-4.4.5/scintilla/src/Editor.cxx:1652:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						eol, strlen(eol));
data/scite-4.4.5/scintilla/src/Editor.cxx:2089:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				const Sci::Position length = strlen(endline);
data/scite-4.4.5/scintilla/src/Editor.cxx:3042:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		eolLen = strlen(eol);
data/scite-4.4.5/scintilla/src/Editor.cxx:3097:78:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		const Sci::Position insertLength = pdoc->InsertString(positionInsert, eol, strlen(eol));
data/scite-4.4.5/scintilla/src/Editor.cxx:4072:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	Sci::Position lengthFound = strlen(ft->lpstrText);
data/scite-4.4.5/scintilla/src/Editor.cxx:4121:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	Sci::Position lengthFound = strlen(txt);
data/scite-4.4.5/scintilla/src/Editor.cxx:4368:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	DropAt(position, value, strlen(value), moving, rectangular);
data/scite-4.4.5/scintilla/src/Editor.cxx:5609:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = strlen(text);
data/scite-4.4.5/scintilla/src/Editor.cxx:5806:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t len = val ? strlen(val) : 0;
data/scite-4.4.5/scintilla/src/Editor.cxx:5857:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			pdoc->InsertString(0, text, strlen(text));
data/scite-4.4.5/scintilla/src/Editor.cxx:6017:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				sel.MainCaret(), replacement, strlen(replacement));
data/scite-4.4.5/scintilla/src/Editor.cxx:6227:75:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const Sci::Position lengthInserted = pdoc->InsertString(insertPos, sz, strlen(sz));
data/scite-4.4.5/scintilla/src/PerLine.cxx:413:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		annotations[line] = AllocateAnnotation(strlen(text), style);
data/scite-4.4.5/scintilla/src/PerLine.cxx:418:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		pah->length = static_cast<int>(strlen(text));
data/scite-4.4.5/scintilla/src/ScintillaBase.cxx:257:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(typeSep-list) : strlen(list);
data/scite-4.4.5/scintilla/src/ScintillaBase.cxx:739:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	props.Set(key, val, strlen(key), strlen(val));
data/scite-4.4.5/scintilla/src/ScintillaBase.cxx:739:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	props.Set(key, val, strlen(key), strlen(val));
data/scite-4.4.5/scintilla/test/unit/catch.hpp:8304:36:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            static_cast<void>(std::getchar());
data/scite-4.4.5/scintilla/test/unit/catch.hpp:8309:36:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            static_cast<void>(std::getchar());
data/scite-4.4.5/scintilla/test/unit/catch.hpp:8490:50:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        return s.size() >= prefix.size() && std::equal(prefix.begin(), prefix.end(), s.begin());
data/scite-4.4.5/scintilla/test/unit/catch.hpp:8496:50:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        return s.size() >= suffix.size() && std::equal(suffix.rbegin(), suffix.rend(), s.rbegin());
data/scite-4.4.5/scintilla/test/unit/catch.hpp:8588:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        m_size( static_cast<size_type>( std::strlen( rawChars ) ) )
data/scite-4.4.5/scintilla/test/unit/catch.hpp:8597:84:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_type rawSize = rawChars == nullptr ? 0 : static_cast<size_type>( std::strlen( rawChars ) );
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:29:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const Sci::Position sLength = static_cast<Sci::Position>(strlen(sText));
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:50:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		const Sci::Position sLength2 = static_cast<Sci::Position>(strlen(sText2));
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:93:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		REQUIRE(memcmp(cpDeletion, sTextDeleted, strlen(sTextDeleted)) == 0);
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:94:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		REQUIRE(memcmp(cb.BufferPointer(), sTextAfterDeletion, strlen(sTextAfterDeletion)) == 0);
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:122:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		REQUIRE(memcmp(cb.BufferPointer(), sTextAfterDeletion, strlen(sTextAfterDeletion)) == 0);
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:183:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cb.InsertString(0, hwair, strlen(hwair), startSequence);
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:197:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cb.InsertString(0, hwair, strlen(hwair), startSequence);
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:227:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cb.InsertString(0, data, strlen(data), startSequence);
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:241:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cb.InsertString(strlen(data), "\n", 1, startSequence);
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:256:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cb.InsertString(strlen(data), "\n", 1, startSequence);
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:276:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cb.InsertString(0, euro, strlen(euro), startSequence);
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:297:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cb.InsertString(5, lead, strlen(lead), startSequence);
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:316:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cb.InsertString(1, ascii, strlen(ascii), startSequence);
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:330:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cb.InsertString(2, nel, strlen(nel), startSequence);
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:350:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cb.InsertString(0, data, strlen(data), startSequence);
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:353:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cb.DeleteChars(1, strlen(data) - 4, startSequence);
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:371:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cb.InsertString(0, data, strlen(data), startSequence);
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:405:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cb.InsertString(1, lead4, strlen(lead4), startSequence);
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:423:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cb.InsertString(0, data, strlen(data), startSequence);
data/scite-4.4.5/scintilla/test/unit/testCellBuffer.cxx:428:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cb.InsertString(2, ascii, strlen(ascii), startSequence);
data/scite-4.4.5/scintilla/test/unit/testUniConversion.cxx:256:83:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return UTF8Classify(reinterpret_cast<const unsigned char *>(s), static_cast<int>(strlen(s)));
data/scite-4.4.5/scintilla/win32/HanjaDic.cxx:107:22:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		const size_t len = wcslen(inout);
data/scite-4.4.5/scintilla/win32/PlatWin.cxx:2244:30:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		const size_t lenAllAlpha = wcslen(wszAllAlpha);
data/scite-4.4.5/scintilla/win32/PlatWin.cxx:2528:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		words = std::vector<char>(s, s+strlen(s)+1);
data/scite-4.4.5/scintilla/win32/PlatWin.cxx:2695:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = static_cast<int>(strlen(widestItem));
data/scite-4.4.5/scintilla/win32/PlatWin.cxx:2770:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(value, item.text, len);
data/scite-4.4.5/scintilla/win32/PlatWin.cxx:2808:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		const int len = static_cast<int>(strlen(text));
data/scite-4.4.5/scintilla/win32/PlatWin.cxx:2879:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const unsigned int len = static_cast<unsigned int>(strlen(text));
data/scite-4.4.5/scintilla/win32/PlatWin.cxx:2895:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t size = strlen(list);
data/scite-4.4.5/scintilla/win32/ScintillaWin.cxx:882:79:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const Sci::Position inputLength = (lengthForEncode >= 0) ? lengthForEncode : strlen(utf8);
data/scite-4.4.5/scite/gtk/DirectorExtension.cxx:154:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size = write(fdCorrespondent,pipeCommand,strlen(pipeCommand));
data/scite-4.4.5/scite/gtk/DirectorExtension.cxx:161:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size = write(fd, pipeCommand, strlen(pipeCommand));
data/scite-4.4.5/scite/gtk/DirectorExtension.cxx:418:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					size_t size = write(fdCorrespondent, pipeName, strlen(pipeName));
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:1181:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			gsize inLeft = strlen(val);
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:1463:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		std::vector<char> uriList(list, list+strlen(list) + 1);
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:1466:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char *lastenduri = uri + strlen(uri);
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:1473:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					uri += strlen("file:");
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:1527:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					openFilter.erase(start, strlen(filterName));
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:1531:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					start += strlen(openFilter.c_str() + start) + 1;
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:1535:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					start += strlen(openFilter.c_str() + start) + 1;
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:1541:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						item += strlen(oneSet.c_str() + item) + 1;
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:1545:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				start += strlen(openFilter.c_str() + start) + 1;
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:2579:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int count = read(fdFIFO, buf, sizeof(buf) - 1);
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:3671:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		std::string spath(path, 1, strlen(path));
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:5249:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(filename) != 0) {
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:5275:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write(sendPipe, pipeData, strlen(pipeData)) == -1)
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:5308:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
				usleep(50000);
data/scite-4.4.5/scite/gtk/SciTEGTK.cxx:5329:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						if ((write(sendPipe, argv[ii]+1, strlen(argv[ii])-1) == -1) || (write(sendPipe, "\n", 1) == -1))
data/scite-4.4.5/scite/lua/src/lauxlib.c:401:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      *len = (def ? strlen(def) : 0);
data/scite-4.4.5/scite/lua/src/lauxlib.c:538:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  luaL_addlstring(B, s, strlen(s));
data/scite-4.4.5/scite/lua/src/lauxlib.c:674:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = getc(lf->f);
data/scite-4.4.5/scite/lua/src/lauxlib.c:679:10:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return getc(lf->f);  /* return next character */
data/scite-4.4.5/scite/lua/src/lauxlib.c:694:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(lf->f);
data/scite-4.4.5/scite/lua/src/lauxlib.c:696:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    *cp = getc(lf->f);  /* skip end-of-line, if present */
data/scite-4.4.5/scite/lua/src/lauxlib.c:765:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return luaL_loadbuffer(L, s, strlen(s), s);
data/scite-4.4.5/scite/lua/src/lauxlib.c:861:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (e == NULL) e = fname + strlen(fname);
data/scite-4.4.5/scite/lua/src/lauxlib.c:994:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(p);
data/scite-4.4.5/scite/lua/src/ldblib.c:409:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (luaL_loadbuffer(L, buffer, strlen(buffer), "=(debug command)") ||
data/scite-4.4.5/scite/lua/src/liolib.c:43:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         (strspn(mode, L_MODEEXT) == strlen(mode)));  /* check extensions */
data/scite-4.4.5/scite/lua/src/liolib.c:90:20:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define l_getc(f)		getc(f)
data/scite-4.4.5/scite/lua/src/liolib.c:470:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int c = getc(f);
data/scite-4.4.5/scite/lua/src/loadlib.c:429:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (l == NULL) l = path + strlen(path);
data/scite-4.4.5/scite/lua/src/lobject.c:284:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(s) > L_MAXLENNUM || pdot == NULL)
data/scite-4.4.5/scite/lua/src/lobject.c:410:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pushstr(L, s, strlen(s));
data/scite-4.4.5/scite/lua/src/lobject.c:461:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  pushstr(L, fmt, strlen(fmt));
data/scite-4.4.5/scite/lua/src/lobject.c:487:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(source);
data/scite-4.4.5/scite/lua/src/lstring.c:231:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  p[0] = luaS_newlstr(L, str, strlen(str));
data/scite-4.4.5/scite/lua/src/lstrlib.c:585:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    upto += strlen(p + upto) + 1;  /* may have more after \0 */
data/scite-4.4.5/scite/lua/src/lstrlib.c:1007:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(form);
data/scite-4.4.5/scite/lua/src/lstrlib.c:1008:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t lm = strlen(lenmod);
data/scite-4.4.5/scite/lua/src/lstrlib.c:1070:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            luaL_argcheck(L, l == strlen(s), arg, "string contains zeros");
data/scite-4.4.5/scite/lua/src/lstrlib.c:1400:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        luaL_argcheck(L, strlen(s) == len, arg, "string contains zeros");
data/scite-4.4.5/scite/lua/src/lstrlib.c:1524:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = (int)strlen(data + pos);
data/scite-4.4.5/scite/lua/src/lundump.c:221:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(s);
data/scite-4.4.5/scite/lua/src/lvm.c:258:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(l);  /* index of first '\0' in both strings */
data/scite-4.4.5/scite/src/Credits.cxx:476:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t len = strlen(s);
data/scite-4.4.5/scite/src/ExportPDF.cxx:132:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const size_t length = strlen(objectData);
data/scite-4.4.5/scite/src/FilePath.cxx:234:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
static size_t strlen(const wchar_t *str) noexcept {
data/scite-4.4.5/scite/src/FilePath.cxx:235:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return wcslen(str);
data/scite-4.4.5/scite/src/FilePath.cxx:573:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		start += strlen(patElement) + 1;
data/scite-4.4.5/scite/src/FilePath.cxx:694:53:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	std::vector<wchar_t> vwcCommand(command, command + wcslen(command) + 1);
data/scite-4.4.5/scite/src/IFaceTable.cxx:112:99:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (constants[constIdx].value == value && (!prefix || strncmp(prefix, constants[constIdx].name, strlen(prefix)) == 0)) {
data/scite-4.4.5/scite/src/LuaExtension.cxx:1529:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		const size_t sl = strlen(filename);
data/scite-4.4.5/scite/src/PropSetFile.cxx:199:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
				return equal ? "1" : "0";
data/scite-4.4.5/scite/src/PropSetFile.cxx:389:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		std::string module = lineBuffer + strlen("module") + 1;
data/scite-4.4.5/scite/src/PropSetFile.cxx:401:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		const char *expr = lineBuffer + strlen("if") + 1;
data/scite-4.4.5/scite/src/PropSetFile.cxx:412:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			std::string importName(lineBuffer + strlen("import") + 1);
data/scite-4.4.5/scite/src/SciTEBase.cxx:1302:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(s);
data/scite-4.4.5/scite/src/SciTEBase.cxx:1314:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(s);
data/scite-4.4.5/scite/src/SciTEBase.cxx:2469:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t lenSymbol = strlen(symbol);
data/scite-4.4.5/scite/src/SciTEBase.cxx:4167:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		userContextItem += strlen(userContextItem) + 1;
data/scite-4.4.5/scite/src/SciTEBase.cxx:4170:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			userContextItem += strlen(userContextItem) + 1;
data/scite-4.4.5/scite/src/SciTEBase.cxx:4354:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (len > strlen(action)) {
data/scite-4.4.5/scite/src/SciTEBase.cxx:4355:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				const char *arg2 = arg + strlen(arg) + 1;
data/scite-4.4.5/scite/src/SciTEBase.cxx:4563:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(params, nextarg, 3);
data/scite-4.4.5/scite/src/SciTEBase.cxx:4615:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t alen = strlen(answercmd);
data/scite-4.4.5/scite/src/SciTEBase.cxx:4788:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	std::vector<char> vActions(actionList, actionList + strlen(actionList) + 1);
data/scite-4.4.5/scite/src/SciTEBase.h:279:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bool read;
data/scite-4.4.5/scite/src/SciTEBase.h:280:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	Localization() : PropSetFile(true), read(false) {
data/scite-4.4.5/scite/src/SciTEBuffers.cxx:1532:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				cdoc += strlen("In file included from ");
data/scite-4.4.5/scite/src/SciTEBuffers.cxx:1588:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (strlen(space) > 2) {
data/scite-4.4.5/scite/src/SciTEBuffers.cxx:1641:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const size_t lenLine = strlen(idLine);
data/scite-4.4.5/scite/src/SciTEBuffers.cxx:1642:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const size_t lenFile = strlen(idFile);
data/scite-4.4.5/scite/src/SciTEBuffers.cxx:1687:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const size_t lenLine = strlen(idLine);
data/scite-4.4.5/scite/src/SciTEBuffers.cxx:1688:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const size_t lenFile = strlen(idFile);
data/scite-4.4.5/scite/src/SciTEBuffers.cxx:1716:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					const size_t length = strlen(file);
data/scite-4.4.5/scite/src/SciTEBuffers.cxx:1753:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const size_t lenFile = strlen(idFile);
data/scite-4.4.5/scite/src/SciTEBuffers.cxx:1754:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const size_t lenLine = strlen(idLine);
data/scite-4.4.5/scite/src/SciTEBuffers.cxx:1775:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const size_t lenFile = strlen(idFile);
data/scite-4.4.5/scite/src/SciTEBuffers.cxx:1776:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const size_t lenLine = strlen(idLine);
data/scite-4.4.5/scite/src/SciTEIO.cxx:190:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			word += strlen(word) + 1;
data/scite-4.4.5/scite/src/SciTEProps.cxx:180:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (!localiser.read) {
data/scite-4.4.5/scite/src/SciTEProps.cxx:262:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(pPropItem, pStart, size);
data/scite-4.4.5/scite/src/SciTEProps.cxx:1692:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sMenuLanguage += strlen(sMenuLanguage) + 1;
data/scite-4.4.5/scite/src/SciTEProps.cxx:1694:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sMenuLanguage += strlen(sMenuLanguage) + 1;
data/scite-4.4.5/scite/src/SciTEProps.cxx:1696:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sMenuLanguage += strlen(sMenuLanguage) + 1;
data/scite-4.4.5/scite/src/SciTEProps.cxx:1710:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sShortCutProp += strlen(sShortCutProp) + 1;
data/scite-4.4.5/scite/src/SciTEProps.cxx:1712:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sShortCutProp += strlen(sShortCutProp) + 1;
data/scite-4.4.5/scite/src/StringHelpers.cxx:24:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	       (std::equal(s.begin(), s.begin() + start.size(), start.begin()));
data/scite-4.4.5/scite/src/StringHelpers.cxx:29:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	       (std::equal(s.begin(), s.begin() + start.size(), start.begin()));
data/scite-4.4.5/scite/src/StringHelpers.cxx:34:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	       (std::equal(s.begin() + s.size() - end.size(), s.end(), end.begin()));
data/scite-4.4.5/scite/src/StringHelpers.cxx:70:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		s.erase(modText, strlen(marker));
data/scite-4.4.5/scite/src/StringHelpers.cxx:357:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	std::string sCopy(s, strlen(s) + 1);
data/scite-4.4.5/scite/src/StringHelpers.cxx:385:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	std::string sCopy(s, strlen(s) + 1);
data/scite-4.4.5/scite/src/StringList.cxx:65:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t slen = strlen(stringList);
data/scite-4.4.5/scite/src/StringList.cxx:121:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	listText.assign(s, s+strlen(s)+1);
data/scite-4.4.5/scite/src/StringList.cxx:204:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		endWord = word + strlen(word);
data/scite-4.4.5/scite/src/Utf8_16.cxx:318:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		const utf16 lastElement = read(m_pEnd-2);
data/scite-4.4.5/scite/src/Utf8_16.cxx:396:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
Utf8_16::utf16 Utf16_Iter::read(const ubyte *pRead) const noexcept {
data/scite-4.4.5/scite/src/Utf8_16.h:44:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	utf16 read(const ubyte *pRead) const noexcept;
data/scite-4.4.5/scite/win32/GUIWin.cxx:143:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t sLen = strlen(s);
data/scite-4.4.5/scite/win32/SciTEWin.cxx:90:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				sKey.erase(0, strlen("Keypad"));
data/scite-4.4.5/scite/win32/SciTEWin.cxx:892:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const char *findText = findFiles + strlen(findFiles) + 1;
data/scite-4.4.5/scite/win32/SciTEWin.cxx:1323:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		::WriteFile(hWriteSubProcess, stop, static_cast<DWORD>(strlen(stop)), &bytesWrote, nullptr);
data/scite-4.4.5/scite/win32/SciTEWin.cxx:1743:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						start += strlen(extensions.c_str() + start) + 1;
data/scite-4.4.5/scite/win32/SciTEWinBar.cxx:81:43:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	GUI::gui_string titleCopy(title, title + wcslen(title) + 1);
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:202:27:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				size_t next = start + wcslen(filterText.c_str() + start) + 1;
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:203:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				next += wcslen(filterText.c_str() + next) + 1;
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:208:30:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					filterText.erase(start, wcslen(filterName));
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:211:14:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				start += wcslen(filterText.c_str() + start) + 1;
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:212:14:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				start += wcslen(filterText.c_str() + start) + 1;
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:237:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		openWhat[wcslen(openWhat) + 1] = L'\0';
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:272:7:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (wcslen(openName) > static_cast<size_t>(ofn.nFileOffset)) {
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:276:34:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			GUI::gui_char *p = openName + wcslen(openName) + 1;
data/scite-4.4.5/scite/win32/SciTEWinDlg.cxx:281:10:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				p += wcslen(p) + 1;
data/scite-4.4.5/scite/win32/UniqueInstance.cxx:95:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (text && strlen(text) > 0) {
data/scite-4.4.5/scite/win32/UniqueInstance.cxx:210:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	WindowCopyData(cmdLine, strlen(cmdLine) + 1);

ANALYSIS SUMMARY:

Hits = 917
Lines analyzed = 205916 in approximately 4.48 seconds (45987 lines/second)
Physical Source Lines of Code (SLOC) = 164791
Hits@level = [0] 111 [1] 246 [2] 592 [3]  27 [4]  51 [5]   1
Hits@level+ = [0+] 1028 [1+] 917 [2+] 671 [3+]  79 [4+]  52 [5+]   1
Hits/KSLOC@level+ = [0+] 6.2382 [1+] 5.56462 [2+] 4.07182 [3+] 0.479395 [4+] 0.315551 [5+] 0.00606829
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.