Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/shapetools-1.4pl6/src/atfs/afarlock.c
Examining data/shapetools-1.4pl6/src/atfs/afcompar.c
Examining data/shapetools-1.4pl6/src/atfs/afdeltaproc.c
Examining data/shapetools-1.4pl6/src/atfs/affiles.c
Examining data/shapetools-1.4pl6/src/atfs/afkeys.c
Examining data/shapetools-1.4pl6/src/atfs/aflib.c
Examining data/shapetools-1.4pl6/src/atfs/aflock.c
Examining data/shapetools-1.4pl6/src/atfs/afmemory.c
Examining data/shapetools-1.4pl6/src/atfs/afretr.c
Examining data/shapetools-1.4pl6/src/atfs/afsattrs.c
Examining data/shapetools-1.4pl6/src/atfs/afsets.c
Examining data/shapetools-1.4pl6/src/atfs/afstates.c
Examining data/shapetools-1.4pl6/src/atfs/afstore.c
Examining data/shapetools-1.4pl6/src/atfs/afsymtab.c
Examining data/shapetools-1.4pl6/src/atfs/aftime.c
Examining data/shapetools-1.4pl6/src/atfs/aftmpfiles.c
Examining data/shapetools-1.4pl6/src/atfs/aftransact.c
Examining data/shapetools-1.4pl6/src/atfs/afudattrs.c
Examining data/shapetools-1.4pl6/src/atfs/afvers.c
Examining data/shapetools-1.4pl6/src/atfs/afarchive.h
Examining data/shapetools-1.4pl6/src/atfs/atfsrepair.h
Examining data/shapetools-1.4pl6/src/atfs/af_version.c
Examining data/shapetools-1.4pl6/src/atfs/afarchive.c
Examining data/shapetools-1.4pl6/src/atfs/afattrs.c
Examining data/shapetools-1.4pl6/src/atfs/afcache.c
Examining data/shapetools-1.4pl6/src/atfs/afconfig.h
Examining data/shapetools-1.4pl6/src/atfs/afdelta.c
Examining data/shapetools-1.4pl6/src/atfs/afenviron.c
Examining data/shapetools-1.4pl6/src/atfs/aferror.c
Examining data/shapetools-1.4pl6/src/atfs/afnames.c
Examining data/shapetools-1.4pl6/src/atfs/afobjcache.c
Examining data/shapetools-1.4pl6/src/atfs/afsys.h
Examining data/shapetools-1.4pl6/src/atfs/atfs.h
Examining data/shapetools-1.4pl6/src/atfs/atfsrepair.c
Examining data/shapetools-1.4pl6/src/atfs/cacheadm.c
Examining data/shapetools-1.4pl6/src/atfs/config.c
Examining data/shapetools-1.4pl6/src/atfs/config.h
Examining data/shapetools-1.4pl6/src/sttk/sighand.c
Examining data/shapetools-1.4pl6/src/sttk/sttk_version.c
Examining data/shapetools-1.4pl6/src/sttk/call.c
Examining data/shapetools-1.4pl6/src/sttk/files.c
Examining data/shapetools-1.4pl6/src/sttk/kbdio.c
Examining data/shapetools-1.4pl6/src/sttk/mktime.c
Examining data/shapetools-1.4pl6/src/sttk/parseargs.c
Examining data/shapetools-1.4pl6/src/sttk/strtab.c
Examining data/shapetools-1.4pl6/src/sttk/ststring.c
Examining data/shapetools-1.4pl6/src/sttk/sttk.h
Examining data/shapetools-1.4pl6/src/atfstk/atfstk_lib.c
Examining data/shapetools-1.4pl6/src/atfstk/user.c
Examining data/shapetools-1.4pl6/src/atfstk/uda.c
Examining data/shapetools-1.4pl6/src/atfstk/citeattr.c
Examining data/shapetools-1.4pl6/src/atfstk/network.c
Examining data/shapetools-1.4pl6/src/atfstk/read.c
Examining data/shapetools-1.4pl6/src/atfstk/bind_scan.c
Examining data/shapetools-1.4pl6/src/atfstk/bind_rules.c
Examining data/shapetools-1.4pl6/src/atfstk/vbind.c
Examining data/shapetools-1.4pl6/src/atfstk/atfstk.h
Examining data/shapetools-1.4pl6/src/atfstk/bind.h
Examining data/shapetools-1.4pl6/src/atfstk/atfstk_vers.c
Examining data/shapetools-1.4pl6/src/atfstk/attrs.c
Examining data/shapetools-1.4pl6/src/atfstk/bind.c
Examining data/shapetools-1.4pl6/src/atfstk/bind_attr.c
Examining data/shapetools-1.4pl6/src/atfstk/bind_options.c
Examining data/shapetools-1.4pl6/src/atfstk/cache.c
Examining data/shapetools-1.4pl6/src/atfstk/lock.c
Examining data/shapetools-1.4pl6/src/atfstk/version.c
Examining data/shapetools-1.4pl6/src/shape/dkey.c
Examining data/shapetools-1.4pl6/src/shape/error.c
Examining data/shapetools-1.4pl6/src/shape/hash.c
Examining data/shapetools-1.4pl6/src/shape/misc.c
Examining data/shapetools-1.4pl6/src/shape/rule.c
Examining data/shapetools-1.4pl6/src/shape/sighand.c
Examining data/shapetools-1.4pl6/src/shape/strbuf.c
Examining data/shapetools-1.4pl6/src/shape/varsec.c
Examining data/shapetools-1.4pl6/src/shape/mfiles.c
Examining data/shapetools-1.4pl6/src/shape/utils.c
Examining data/shapetools-1.4pl6/src/shape/queues.c
Examining data/shapetools-1.4pl6/src/shape/strbuf.h
Examining data/shapetools-1.4pl6/src/shape/mfiles.h
Examining data/shapetools-1.4pl6/src/shape/mffuncs.h
Examining data/shapetools-1.4pl6/src/shape/version.c
Examining data/shapetools-1.4pl6/src/shape/files.c
Examining data/shapetools-1.4pl6/src/shape/inherit.c
Examining data/shapetools-1.4pl6/src/shape/macro.c
Examining data/shapetools-1.4pl6/src/shape/main.c
Examining data/shapetools-1.4pl6/src/shape/parser.c
Examining data/shapetools-1.4pl6/src/shape/parser.h
Examining data/shapetools-1.4pl6/src/shape/produce.c
Examining data/shapetools-1.4pl6/src/shape/shape.h
Examining data/shapetools-1.4pl6/src/shape/shapeopt.c
Examining data/shapetools-1.4pl6/src/shape/std.c
Examining data/shapetools-1.4pl6/src/vc/atfsit/atfsitvers.c
Examining data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c
Examining data/shapetools-1.4pl6/src/vc/rcs2atfs/afind.c
Examining data/shapetools-1.4pl6/src/vc/rcs2atfs/main.c
Examining data/shapetools-1.4pl6/src/vc/rcs2atfs/out.c
Examining data/shapetools-1.4pl6/src/vc/rcs2atfs/version.c
Examining data/shapetools-1.4pl6/src/vc/rcs2atfs/functions.h
Examining data/shapetools-1.4pl6/src/vc/rcs2atfs/rcs2atfs.h
Examining data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c
Examining data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c
Examining data/shapetools-1.4pl6/src/vc/rcs2atfs/utime.c
Examining data/shapetools-1.4pl6/src/vc/retrv/doretrv.c
Examining data/shapetools-1.4pl6/src/vc/retrv/retrversion.c
Examining data/shapetools-1.4pl6/src/vc/retrv/retrv.c
Examining data/shapetools-1.4pl6/src/vc/save/saveversion.c
Examining data/shapetools-1.4pl6/src/vc/save/dosave.c
Examining data/shapetools-1.4pl6/src/vc/save/save.c
Examining data/shapetools-1.4pl6/src/vc/vadm/vadm.c
Examining data/shapetools-1.4pl6/src/vc/vadm/dovadm.c
Examining data/shapetools-1.4pl6/src/vc/vadm/vadm.h
Examining data/shapetools-1.4pl6/src/vc/vadm/vadmversion.c
Examining data/shapetools-1.4pl6/src/vc/vfind/vfversion.c
Examining data/shapetools-1.4pl6/src/vc/vfind/vfind.c
Examining data/shapetools-1.4pl6/src/vc/vl/display.c
Examining data/shapetools-1.4pl6/src/vc/vl/vlversion.c
Examining data/shapetools-1.4pl6/src/vc/vl/vl.c
Examining data/shapetools-1.4pl6/include/afconfig.h
Examining data/shapetools-1.4pl6/vgrep-2.0/alloca.c
Examining data/shapetools-1.4pl6/vgrep-2.0/dfa.c
Examining data/shapetools-1.4pl6/vgrep-2.0/dfa.h
Examining data/shapetools-1.4pl6/vgrep-2.0/getopt.c
Examining data/shapetools-1.4pl6/vgrep-2.0/getopt.h
Examining data/shapetools-1.4pl6/vgrep-2.0/getpagesize.h
Examining data/shapetools-1.4pl6/vgrep-2.0/grep.h
Examining data/shapetools-1.4pl6/vgrep-2.0/kwset.c
Examining data/shapetools-1.4pl6/vgrep-2.0/kwset.h
Examining data/shapetools-1.4pl6/vgrep-2.0/obstack.c
Examining data/shapetools-1.4pl6/vgrep-2.0/obstack.h
Examining data/shapetools-1.4pl6/vgrep-2.0/regex.c
Examining data/shapetools-1.4pl6/vgrep-2.0/regex.h
Examining data/shapetools-1.4pl6/vgrep-2.0/search.c
Examining data/shapetools-1.4pl6/vgrep-2.0/grep.c

FINAL RESULTS:

data/shapetools-1.4pl6/include/afconfig.h:312:5:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
int	chmod		A((const char *path, mode_t mode));
data/shapetools-1.4pl6/include/afconfig.h:313:5:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
int	chown		A((const char *path, uid_t owner, gid_t group));
data/shapetools-1.4pl6/src/atfs/afarchive.c:1066:5:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    chown (dataArchSym, geteuid(), list->af_owngid);
data/shapetools-1.4pl6/src/atfs/afarchive.c:1069:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
      chmod (dataArchSym, fileMode);
data/shapetools-1.4pl6/src/atfs/afarlock.c:80:7:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
      chown (fileName, geteuid(), list->af_owngid);
data/shapetools-1.4pl6/src/atfs/afarlock.c:83:2:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
	chmod (fileName, fileMode);
data/shapetools-1.4pl6/src/atfs/afconfig.h:312:5:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
int	chmod		A((const char *path, mode_t mode));
data/shapetools-1.4pl6/src/atfs/afconfig.h:313:5:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
int	chown		A((const char *path, uid_t owner, gid_t group));
data/shapetools-1.4pl6/src/atfs/aferror.c:128:3:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  chmod (AF_ERRLOG, 0666);
data/shapetools-1.4pl6/src/atfs/aferror.c:213:3:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  chmod (AF_ERRLOG, 0666);
data/shapetools-1.4pl6/src/atfs/afnames.c:247:8:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
	  if (chown (arName, curAtFSuid, curAtFSgid) == -1)
data/shapetools-1.4pl6/src/atfs/afnames.c:248:6:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
	    chown (arName, -1, curAtFSgid);
data/shapetools-1.4pl6/src/atfs/afnames.c:254:6:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
	    chmod (arName, curAtFSMode);
data/shapetools-1.4pl6/src/atfs/afnames.c:255:10:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
	    if (chown (arName, curAtFSuid, curAtFSgid) == -1)
data/shapetools-1.4pl6/src/atfs/afnames.c:256:8:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
	      chown (arName, -1, curAtFSgid);
data/shapetools-1.4pl6/src/atfs/afsattrs.c:63:9:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    if (chown (key->af_ldes->af_busyfilename, (int) uid, (int) gid) == ERROR)
data/shapetools-1.4pl6/src/atfs/afsattrs.c:91:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (chmod (key->af_ldes->af_busyfilename, mode) == ERROR)
data/shapetools-1.4pl6/src/atfs/afstore.c:333:3:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  chmod (name, (int) VATTR(key).af_mode);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1199:9:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    if (chown (arFilename, -1, arGid) == -1) {
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1204:14:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    else if (chown (datFilename, -1, arGid) == -1) {
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1221:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (chmod (arFilename, attrArMode) == -1) {
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1226:14:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    else if (chmod (datFilename, attrArMode) == -1) {
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1296:5:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    chown (arFilename, -1, arGid);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1297:5:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    chmod (arFilename, attrArMode);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1312:5:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    chown (datFilename, -1, arGid);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1313:5:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    chmod (datFilename, attrArMode);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1438:12:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
	      if (chmod (attrArPath, atfsIbuf.st_mode) == -1)
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1454:12:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
	      if (chown (attrArPath, atfsIbuf.st_uid, atfsIbuf.st_gid) == -1)
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1455:7:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
		if (chown (attrArPath, geteuid(), atfsIbuf.st_gid) == -1) {
data/shapetools-1.4pl6/src/atfs/config.h:286:5:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
int	chmod		A((const char *path, mode_t mode));
data/shapetools-1.4pl6/src/atfs/config.h:287:5:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
int	chown		A((const char *path, uid_t owner, gid_t group));
data/shapetools-1.4pl6/src/atfstk/uda.c:377:5:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
    strncat (tmpAttr, attrValue, AT_CLEADMAXLEN);
data/shapetools-1.4pl6/src/shape/files.c:268:3:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  chmod (unixName, (mode_t) VATTR(restoreKey).af_mode);
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:291:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
      chmod (destName, asoAttrBuf.af_mode & ~0222);
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:437:5:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    chmod (destName, asoAttrBuf.af_mode);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:196:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
      chmod (busyName, (int)(ibuf.st_mode | 0200));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:243:2:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
	chmod (busyName, (int)(ibuf.st_mode & ~0222));
data/shapetools-1.4pl6/include/afconfig.h:310:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int	access		A((const char *path, int amode));
data/shapetools-1.4pl6/include/afconfig.h:318:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
int	execvp		A((const char *file, const char *argv[]));
data/shapetools-1.4pl6/include/afconfig.h:345:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int	fprintf		A((FILE *stream, const char *format, ...));
data/shapetools-1.4pl6/include/afconfig.h:346:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int	printf		A((const char *format, ...));
data/shapetools-1.4pl6/include/afconfig.h:347:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
int	fscanf		A((FILE *stream, const char *format, ...));
data/shapetools-1.4pl6/include/afconfig.h:364:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
int	system		A((const char *string));
data/shapetools-1.4pl6/include/afconfig.h:373:5:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
int	syslog		A((int priority, char *message, ...));
data/shapetools-1.4pl6/include/afconfig.h:375:7:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
FILE*	popen		A((const char *command, const char *mode));
data/shapetools-1.4pl6/src/atfs/afarchive.c:1041:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (errMsg, "Cannot write attributes archive file (fwrite failed) --  preserving temporary file as %s", arBackupName);
data/shapetools-1.4pl6/src/atfs/afarchive.c:1044:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (errMsg, "Cannot write attributes archive file (fwrite failed) --  preserving temporary file as %s", attrTmpName);
data/shapetools-1.4pl6/src/atfs/afattrs.c:74:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (attrBuf, CATTR(aso).af_host);
data/shapetools-1.4pl6/src/atfs/afattrs.c:80:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (attrBuf, CATTR(aso).af_syspath);
data/shapetools-1.4pl6/src/atfs/afattrs.c:85:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (attrBuf, VATTR(aso).af_name);
data/shapetools-1.4pl6/src/atfs/afattrs.c:88:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (attrBuf, VATTR(aso).af_type);
data/shapetools-1.4pl6/src/atfs/afattrs.c:94:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (attrBuf, af_gbusname (CATTR(aso).af_syspath, VATTR(aso).af_name, VATTR(aso).af_type));
data/shapetools-1.4pl6/src/atfs/afattrs.c:100:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (attrBuf, VATTR(aso).af_name);
data/shapetools-1.4pl6/src/atfs/afattrs.c:103:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (attrBuf, VATTR(aso).af_type);
data/shapetools-1.4pl6/src/atfs/afattrs.c:109:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (attrBuf, tmpBuf);
data/shapetools-1.4pl6/src/atfs/afattrs.c:116:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (attrBuf, af_gbusname (CATTR(aso).af_syspath, VATTR(aso).af_name, VATTR(aso).af_type));
data/shapetools-1.4pl6/src/atfs/afattrs.c:121:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (attrBuf, tmpBuf);
data/shapetools-1.4pl6/src/atfs/afattrs.c:128:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (attrBuf, VATTR(aso).af_name);
data/shapetools-1.4pl6/src/atfs/afattrs.c:134:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (attrBuf, VATTR(aso).af_type);
data/shapetools-1.4pl6/src/atfs/afattrs.c:181:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (attrBuf, "%s@%s", CATTR(aso).af_ownname, CATTR(aso).af_owndomain);
data/shapetools-1.4pl6/src/atfs/afattrs.c:186:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (attrBuf, "%s@%s", VATTR(aso).af_auname, VATTR(aso).af_audomain);
data/shapetools-1.4pl6/src/atfs/afattrs.c:208:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (attrBuf, "%s@%s", VATTR(aso).af_lckname, VATTR(aso).af_lckdomain);
data/shapetools-1.4pl6/src/atfs/afattrs.c:213:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (attrBuf, asctime (localtime (&VATTR(aso).af_mtime)));
data/shapetools-1.4pl6/src/atfs/afattrs.c:219:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (attrBuf, asctime (localtime (&VATTR(aso).af_atime)));
data/shapetools-1.4pl6/src/atfs/afattrs.c:225:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (attrBuf, asctime (localtime (&VATTR(aso).af_ctime)));
data/shapetools-1.4pl6/src/atfs/afattrs.c:232:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (attrBuf, asctime (localtime (&VATTR(aso).af_stime)));
data/shapetools-1.4pl6/src/atfs/afattrs.c:240:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (attrBuf, asctime (localtime (&VATTR(aso).af_ltime)));
data/shapetools-1.4pl6/src/atfs/afattrs.c:256:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (udattr, valptr+1);
data/shapetools-1.4pl6/src/atfs/afattrs.c:320:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (userBuf.af_username, CATTR(aso).af_ownname);
data/shapetools-1.4pl6/src/atfs/afattrs.c:321:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (userBuf.af_userhost, CATTR(aso).af_ownhost);
data/shapetools-1.4pl6/src/atfs/afattrs.c:322:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (userBuf.af_userdomain, CATTR(aso).af_owndomain);
data/shapetools-1.4pl6/src/atfs/afattrs.c:327:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (userBuf.af_username, VATTR(aso).af_auname);
data/shapetools-1.4pl6/src/atfs/afattrs.c:328:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (userBuf.af_userhost, VATTR(aso).af_auhost);
data/shapetools-1.4pl6/src/atfs/afattrs.c:329:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (userBuf.af_userdomain, VATTR(aso).af_audomain);
data/shapetools-1.4pl6/src/atfs/afattrs.c:335:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (userBuf.af_username, VATTR(aso).af_lckname);
data/shapetools-1.4pl6/src/atfs/afattrs.c:336:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (userBuf.af_userhost, VATTR(aso).af_lckhost);
data/shapetools-1.4pl6/src/atfs/afattrs.c:337:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (userBuf.af_userdomain, VATTR(aso).af_lckdomain);
data/shapetools-1.4pl6/src/atfs/afattrs.c:427:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (tmpuda, udaptr);
data/shapetools-1.4pl6/src/atfs/afattrs.c:431:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (tmpuda, valptr);
data/shapetools-1.4pl6/src/atfs/afattrs.c:475:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrbuf->af_host, CATTR(key).af_host);
data/shapetools-1.4pl6/src/atfs/afattrs.c:476:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrbuf->af_name, VATTR(key).af_name);
data/shapetools-1.4pl6/src/atfs/afattrs.c:477:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrbuf->af_type, NOTNIL(VATTR(key).af_type));
data/shapetools-1.4pl6/src/atfs/afattrs.c:478:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrbuf->af_syspath, CATTR(key).af_syspath);
data/shapetools-1.4pl6/src/atfs/afattrs.c:483:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrbuf->af_owner.af_username, CATTR(key).af_ownname);
data/shapetools-1.4pl6/src/atfs/afattrs.c:484:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrbuf->af_owner.af_userhost, CATTR(key).af_ownhost);
data/shapetools-1.4pl6/src/atfs/afattrs.c:485:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrbuf->af_owner.af_userdomain, CATTR(key).af_owndomain);
data/shapetools-1.4pl6/src/atfs/afattrs.c:486:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrbuf->af_author.af_username, VATTR(key).af_auname);
data/shapetools-1.4pl6/src/atfs/afattrs.c:487:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrbuf->af_author.af_userhost, VATTR(key).af_auhost);
data/shapetools-1.4pl6/src/atfs/afattrs.c:488:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrbuf->af_author.af_userdomain, VATTR(key).af_audomain);
data/shapetools-1.4pl6/src/atfs/afattrs.c:491:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrbuf->af_locker.af_username, NOTNIL(VATTR(key).af_lckname));
data/shapetools-1.4pl6/src/atfs/afattrs.c:492:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrbuf->af_locker.af_userhost, NOTNIL(VATTR(key).af_lckhost));
data/shapetools-1.4pl6/src/atfs/afattrs.c:493:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrbuf->af_locker.af_userdomain, NOTNIL(VATTR(key).af_lckdomain));
data/shapetools-1.4pl6/src/atfs/afattrs.c:507:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (attrbuf->af_udattrs[i], udalist[i]);
data/shapetools-1.4pl6/src/atfs/afcache.c:236:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (msgBuf, "directory %s does not exist", pathSym);
data/shapetools-1.4pl6/src/atfs/afcache.c:241:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (msgBuf, "%s is not a directory", pathSym);
data/shapetools-1.4pl6/src/atfs/afconfig.h:310:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int	access		A((const char *path, int amode));
data/shapetools-1.4pl6/src/atfs/afconfig.h:318:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
int	execvp		A((const char *file, const char *argv[]));
data/shapetools-1.4pl6/src/atfs/afconfig.h:345:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int	fprintf		A((FILE *stream, const char *format, ...));
data/shapetools-1.4pl6/src/atfs/afconfig.h:346:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int	printf		A((const char *format, ...));
data/shapetools-1.4pl6/src/atfs/afconfig.h:347:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
int	fscanf		A((FILE *stream, const char *format, ...));
data/shapetools-1.4pl6/src/atfs/afconfig.h:364:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
int	system		A((const char *string));
data/shapetools-1.4pl6/src/atfs/afconfig.h:373:5:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
int	syslog		A((int priority, char *message, ...));
data/shapetools-1.4pl6/src/atfs/afconfig.h:375:7:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
FILE*	popen		A((const char *command, const char *mode));
data/shapetools-1.4pl6/src/atfs/afenviron.c:106:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (caller.af_username, pwent->pw_name);
data/shapetools-1.4pl6/src/atfs/afenviron.c:107:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (caller.af_userhost, af_gethostname ());
data/shapetools-1.4pl6/src/atfs/afenviron.c:108:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (caller.af_userdomain, af_getdomain ());
data/shapetools-1.4pl6/src/atfs/afenviron.c:116:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (result.af_username, pwent->pw_name);
data/shapetools-1.4pl6/src/atfs/afenviron.c:117:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (result.af_userhost, af_gethostname ());
data/shapetools-1.4pl6/src/atfs/afenviron.c:118:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (result.af_userdomain, af_getdomain ());
data/shapetools-1.4pl6/src/atfs/afenviron.c:249:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(domainName, start);
data/shapetools-1.4pl6/src/atfs/afenviron.c:268:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    return strcpy(domainName, p+1);
data/shapetools-1.4pl6/src/atfs/afenviron.c:284:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(domainName, start);
data/shapetools-1.4pl6/src/atfs/afenviron.c:305:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(domainName, domainSym);
data/shapetools-1.4pl6/src/atfs/aferror.c:116:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (diagstr, called);
data/shapetools-1.4pl6/src/atfs/aferror.c:133:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (logName, pwent->pw_name);
data/shapetools-1.4pl6/src/atfs/aferror.c:157:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (diagstr, called);
data/shapetools-1.4pl6/src/atfs/aferror.c:176:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (diagstr, called);
data/shapetools-1.4pl6/src/atfs/aferror.c:218:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (logName, pwent->pw_name);
data/shapetools-1.4pl6/src/atfs/aferror.c:275:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (errMsg, "%s: %s", string, sys_errlist[errno]);
data/shapetools-1.4pl6/src/atfs/aferror.c:278:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (errMsg, "%s: %s", string, diagstr);
data/shapetools-1.4pl6/src/atfs/aferror.c:281:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (errMsg, "%s: %s", string, errors [abs(af_errno)]);
data/shapetools-1.4pl6/src/atfs/aflock.c:47:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (locker->af_userhost, af_gethostname());
data/shapetools-1.4pl6/src/atfs/aflock.c:49:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (locker->af_userdomain, af_getdomain());
data/shapetools-1.4pl6/src/atfs/aflock.c:100:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (locker.af_username, VATTR(key).af_lckname);
data/shapetools-1.4pl6/src/atfs/aflock.c:101:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (locker.af_userhost, VATTR(key).af_lckhost);
data/shapetools-1.4pl6/src/atfs/aflock.c:102:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (locker.af_userdomain, VATTR(key).af_lckdomain);
data/shapetools-1.4pl6/src/atfs/aflock.c:131:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (locker.af_username, VATTR(key).af_lckname);
data/shapetools-1.4pl6/src/atfs/aflock.c:132:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (locker.af_userhost, VATTR(key).af_lckhost);
data/shapetools-1.4pl6/src/atfs/aflock.c:133:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (locker.af_userdomain, VATTR(key).af_lckdomain);
data/shapetools-1.4pl6/src/atfs/afnames.c:126:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access (archDirSym, W_OK))
data/shapetools-1.4pl6/src/atfs/afnames.c:179:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmpname, "/%s", AF_SUBDIR);
data/shapetools-1.4pl6/src/atfs/afnames.c:181:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmpname, "%s/%s", pathname, AF_SUBDIR);
data/shapetools-1.4pl6/src/atfs/afnames.c:252:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	  if (access (arName, W_OK)) {
data/shapetools-1.4pl6/src/atfs/afnames.c:266:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (subdirName, "%s/%s", archivePath, AF_ATTRDIR);
data/shapetools-1.4pl6/src/atfs/afnames.c:268:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (subdirName, "%s/%s", archivePath, AF_DATADIR);
data/shapetools-1.4pl6/src/atfs/afnames.c:329:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (nameFragment, &unixName[nameLen-(NAME_MAX-5)]);
data/shapetools-1.4pl6/src/atfs/afnames.c:330:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (uniqName, "%s%s%c", AF_CACHEFILEID, nameFragment, uniqChar);
data/shapetools-1.4pl6/src/atfs/afnames.c:333:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (uniqName, "%s%s%c", AF_CACHEFILEID, unixName, uniqChar);
data/shapetools-1.4pl6/src/atfs/afnames.c:335:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (uniqName, "%s%s%c", AF_CACHEFILEID, unixName, uniqChar);
data/shapetools-1.4pl6/src/atfs/afnames.c:353:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmpname, "%s/tmp%d%d", pathname, (int) getpid(), count++);
data/shapetools-1.4pl6/src/atfs/afnames.c:355:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (tmpname, "%s/atfs%d%d", AF_TMPDIR, (int) getpid(), count++);
data/shapetools-1.4pl6/src/atfs/afnames.c:371:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (busyname, name);
data/shapetools-1.4pl6/src/atfs/afnames.c:373:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (busyname, "/%s", name);
data/shapetools-1.4pl6/src/atfs/afnames.c:375:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (busyname, "%s/%s", pathname, name);
data/shapetools-1.4pl6/src/atfs/afnames.c:378:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (busyname, type);
data/shapetools-1.4pl6/src/atfs/afnames.c:395:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (afPath, unixName);
data/shapetools-1.4pl6/src/atfs/afnames.c:457:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (afname, namePtr);
data/shapetools-1.4pl6/src/atfs/afnames.c:502:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (aftype, typeptr + sizeof(char));
data/shapetools-1.4pl6/src/atfs/afobjcache.c:108:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (cacheName, afCacheFileName (list->af_arpath, AF_CACHENAME));
data/shapetools-1.4pl6/src/atfs/afobjcache.c:314:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (cacheName, afCacheFileName (list->af_arpath, AF_CACHENAME));
data/shapetools-1.4pl6/src/atfs/afretr.c:566:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrs->af_name, AF_PATTERN_ALL);
data/shapetools-1.4pl6/src/atfs/afretr.c:567:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrs->af_type, AF_PATTERN_ALL);
data/shapetools-1.4pl6/src/atfs/afsattrs.c:172:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (note, VATTR(key).af_note);
data/shapetools-1.4pl6/src/atfs/afsets.c:133:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (af_udaname, attr);
data/shapetools-1.4pl6/src/atfs/afsets.c:137:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (af_udaname, attr); 
data/shapetools-1.4pl6/src/atfs/afsymtab.c:109:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (afSymhash[where].symbol, symbol);
data/shapetools-1.4pl6/src/atfs/afsymtab.c:119:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (new->symbol, symbol);
data/shapetools-1.4pl6/src/atfs/afudattrs.c:119:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (symptr, symbol);
data/shapetools-1.4pl6/src/atfs/afudattrs.c:183:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (VATTR(key).af_uhtab[symindex].symbol, symbol);
data/shapetools-1.4pl6/src/atfs/afudattrs.c:193:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy (entry->symbol, symbol);
data/shapetools-1.4pl6/src/atfs/afudattrs.c:207:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (VATTR(key).af_udalist[i], symbol);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:114:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (newarname, afArchivePath (af_uniqpath (".")));
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:116:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (newarname, archname);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:118:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (name, archname + strlen (AF_OLD_ATFSFILEID));
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:131:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (name, itemptr);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:135:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (name, itemptr);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:156:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  sscanf (strBuf, "%s", answer);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:278:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf (stdin, "%s", value);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:427:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (commandLine, "rm -f %s/%s%s* %s/%s%s*", arPath, AF_CACHEFILEID, busyname,
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:429:2:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	system (commandLine);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:434:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (commandLine, "rm -f %s/%s%s* %s/%s%s*", arPath, AF_CACHEFILEID, busyname,
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:436:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      system (commandLine);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:551:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access (arFilename, F_OK) == 0) {
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:579:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access (datFilename, F_OK) == 0) {
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:608:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access (af_gbusname (NULL, cAttrs.name, cAttrs.type), F_OK) == 0)
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1239:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (commandLine, "cmp -s %s %s", arFilename, arTmpFilename);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1241:23:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if (!needUpdate && (system (commandLine) == 0)) {
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1242:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
     sprintf (commandLine, "cmp -s %s %s", datFilename, datTmpFilename);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1243:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if (system (commandLine) == 0) {
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1345:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (oldArFullName, "%s/%s", archivePath, archiveName);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1346:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (oldDatFullName, "%s/%s", archivePath, archiveName);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1349:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (commandLine, "mv -f %s %s; mv -f %s %s",
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1353:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system (commandLine);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1357:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (commandLine, "rm -f %s/%s* AFS/%s*", afArchivePath ("."), AF_OLD_BPFILEID, AF_OLD_BPFILEID);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1358:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system (commandLine);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1409:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (attrArPath, "%s/%s", arPathPtr, AF_ATTRDIR);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1412:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (attrArPath, "%s/%s", arPathPtr, AF_DATADIR);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1415:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (attrArPath, "%s/%s", arPathPtr, AF_LOCKDIR);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1418:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (attrArPath, "%s/%s", arPathPtr, AF_CACHENAME);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1476:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (commandLine, "rm -f %s/%s* %s/%s* %s/%s*", arPathPtr, AF_CACHEFILEID,
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1478:2:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	system (commandLine);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1483:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (commandLine, "rm -f %s/%s* %s/%s* %s/%s*", arPathPtr, AF_CACHEFILEID,
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1485:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      system (commandLine);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1493:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (attrArPath, "%s/%s", arPathPtr, AF_ATTRDIR);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1506:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access ("AFS", F_OK) == -1) {
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1512:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (commandLine, "mv AFS %s", AF_SUBDIR);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1513:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system (commandLine);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1562:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (fileName, afReadName (dirEntry->d_name));
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1565:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (fileName, dirEntry->d_name + strlen (AF_OLD_ATFSFILEID));
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1579:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (commandLine, "rm -f %s/%s* %s/%s*",
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1581:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system (commandLine);
data/shapetools-1.4pl6/src/atfs/config.c:129:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (newStr, str);
data/shapetools-1.4pl6/src/atfs/config.h:284:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int	access		A((const char *path, int amode));
data/shapetools-1.4pl6/src/atfs/config.h:292:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
int	execvp		A((const char *file, const char *argv[])); 
data/shapetools-1.4pl6/src/atfs/config.h:319:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int	fprintf		A((FILE *stream, const char *format, ...));
data/shapetools-1.4pl6/src/atfs/config.h:320:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int	printf		A((const char *format, ...));
data/shapetools-1.4pl6/src/atfs/config.h:321:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
int	fscanf		A((FILE *stream, const char *format, ...));
data/shapetools-1.4pl6/src/atfs/config.h:338:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
int	system		A((const char *string));
data/shapetools-1.4pl6/src/atfs/config.h:347:5:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
int	syslog		A((int priority, char *message, ...));
data/shapetools-1.4pl6/src/atfs/config.h:349:7:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
FILE*	popen		A((const char *command, const char *mode));
data/shapetools-1.4pl6/src/atfstk/attrs.c:263:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (name, "%s%s%s", path, *path ? "/" : "", af_retattr (aso, AF_ATTUNIXNAME));
data/shapetools-1.4pl6/src/atfstk/attrs.c:265:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (name, "%s%s%s", path, *path ? "/" : "", af_retattr (aso, AF_ATTBOUND));
data/shapetools-1.4pl6/src/atfstk/bind.c:230:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (aliasAttr, "%s=%s", AT_ATTALIAS, baselinePtr->baselineString);
data/shapetools-1.4pl6/src/atfstk/bind.c:296:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (atBindErrorMsg, af_errmsg ("bindByDate"));
data/shapetools-1.4pl6/src/atfstk/bind.c:307:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (atBindErrorMsg, af_errmsg ("bindByDate"));
data/shapetools-1.4pl6/src/atfstk/bind.c:394:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (bindTargName, "/%s", reqAttrs->af_name);
data/shapetools-1.4pl6/src/atfstk/bind.c:396:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (bindTargName, "%s/%s", reqAttrs->af_syspath, reqAttrs->af_name);
data/shapetools-1.4pl6/src/atfstk/bind.c:399:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (bindTargName, reqAttrs->af_name);
data/shapetools-1.4pl6/src/atfstk/bind.c:402:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (bindTargName, reqAttrs->af_type);
data/shapetools-1.4pl6/src/atfstk/bind.c:430:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (patternBuf, pattern);
data/shapetools-1.4pl6/src/atfstk/bind.c:439:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "    %d)\t%s - pattern: %s (%s)", altCount++, atCurRuleName(), pattern, stConvertPattern (pattern));
data/shapetools-1.4pl6/src/atfstk/bind.c:448:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (atBindErrorMsg, reMsg);
data/shapetools-1.4pl6/src/atfstk/bind.c:501:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (atBindErrorMsg, af_errmsg ("bindByRule"));
data/shapetools-1.4pl6/src/atfstk/bind.c:518:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "\t%s (%s,%s)", predName, NOTNIL(arg1), NOTNIL(arg2));
data/shapetools-1.4pl6/src/atfstk/bind.c:525:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "\t%s (%s)", predName, NOTNIL(arg1));
data/shapetools-1.4pl6/src/atfstk/bind.c:532:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "\t%s (%s,%s)", predName, NOTNIL(arg1), NOTNIL(arg2));
data/shapetools-1.4pl6/src/atfstk/bind.c:539:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "\t%s (%s,%s)", predName, NOTNIL(arg1), NOTNIL(arg2));
data/shapetools-1.4pl6/src/atfstk/bind.c:546:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "\t%s (%s,%s)", predName, NOTNIL(arg1), NOTNIL(arg2));
data/shapetools-1.4pl6/src/atfstk/bind.c:553:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "\t%s (%s,%s)", predName, NOTNIL(arg1), NOTNIL(arg2));
data/shapetools-1.4pl6/src/atfstk/bind.c:560:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "\t%s (%s,%s)", predName, NOTNIL(arg1), NOTNIL(arg2));
data/shapetools-1.4pl6/src/atfstk/bind.c:567:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "\t%s (%s)", predName, NOTNIL(arg1));
data/shapetools-1.4pl6/src/atfstk/bind.c:574:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "\t%s (%s)", predName, NOTNIL(arg1));
data/shapetools-1.4pl6/src/atfstk/bind.c:581:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "\t%s (%s)", predName, NOTNIL(arg1));
data/shapetools-1.4pl6/src/atfstk/bind.c:598:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "\t%s (%s,%s)", predName, NOTNIL(arg1), NOTNIL(arg2));
data/shapetools-1.4pl6/src/atfstk/bind.c:614:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "\t%s (%s)", predName, NOTNIL(arg1));
data/shapetools-1.4pl6/src/atfstk/bind.c:626:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "\t%s (%s)", predName, NOTNIL(arg1));
data/shapetools-1.4pl6/src/atfstk/bind.c:638:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "\t%s (%s,%s)", predName, NOTNIL(arg1), NOTNIL(arg2));
data/shapetools-1.4pl6/src/atfstk/bind.c:648:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "\t%s (%s)", predName, NOTNIL(arg1));
data/shapetools-1.4pl6/src/atfstk/bind.c:674:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "\t%s (%s)", predName, NOTNIL(arg1));
data/shapetools-1.4pl6/src/atfstk/bind.c:678:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "%s", NOTNIL(arg1));
data/shapetools-1.4pl6/src/atfstk/bind.c:686:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "\t%s (%s)", predName, NOTNIL(arg1));
data/shapetools-1.4pl6/src/atfstk/bind.c:690:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "%s", NOTNIL(arg1));
data/shapetools-1.4pl6/src/atfstk/bind.c:697:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (stMessage, "in bind rule -- %s", atBindErrorMsg);
data/shapetools-1.4pl6/src/atfstk/bind.c:781:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "  Bind unique: %s[] (default)", name);
data/shapetools-1.4pl6/src/atfstk/bind.c:792:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "  Bind unique %s[%d.%d] (vnum)", name, genNo, revNo);
data/shapetools-1.4pl6/src/atfstk/bind.c:802:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (aliasAttr, "%s=%s", AT_ATTALIAS, bindName);
data/shapetools-1.4pl6/src/atfstk/bind.c:805:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_syspath, afPath); 
data/shapetools-1.4pl6/src/atfstk/bind.c:806:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_name, afName);
data/shapetools-1.4pl6/src/atfstk/bind.c:807:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_type, afType);
data/shapetools-1.4pl6/src/atfstk/bind.c:810:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "  Bind unique: %s[%s] (alias)", name, bindName);
data/shapetools-1.4pl6/src/atfstk/bind.c:823:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (atBindErrorMsg, af_errmsg ("atBindVersion"));
data/shapetools-1.4pl6/src/atfstk/bind.c:837:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "  Bind unique %s[%s:] (rule)", name, bindName);
data/shapetools-1.4pl6/src/atfstk/bind.c:843:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_syspath, afPath); 
data/shapetools-1.4pl6/src/atfstk/bind.c:844:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_name, afName);
data/shapetools-1.4pl6/src/atfstk/bind.c:845:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_type, afType);
data/shapetools-1.4pl6/src/atfstk/bind.c:853:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "  Bind unique %s[%s] (date)", name, stWriteTime (date));
data/shapetools-1.4pl6/src/atfstk/bind.c:859:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_syspath, afPath); 
data/shapetools-1.4pl6/src/atfstk/bind.c:860:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_name, afName);
data/shapetools-1.4pl6/src/atfstk/bind.c:861:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_type, afType);
data/shapetools-1.4pl6/src/atfstk/bind.c:869:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "  Bind unique: %s[%s] (cache key)", name, bindName);
data/shapetools-1.4pl6/src/atfstk/bind.c:875:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (aliasAttr, "%s=%s", AT_ATTCACHEKEY, bindName);
data/shapetools-1.4pl6/src/atfstk/bind.c:878:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_syspath, afPath); 
data/shapetools-1.4pl6/src/atfstk/bind.c:879:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_name, afName);
data/shapetools-1.4pl6/src/atfstk/bind.c:880:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_type, afType);
data/shapetools-1.4pl6/src/atfstk/bind.c:883:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (atBindErrorMsg, af_errmsg ("atBindVersion"));
data/shapetools-1.4pl6/src/atfstk/bind.c:961:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (reqAttrs.af_syspath, af_afpath (pattern));
data/shapetools-1.4pl6/src/atfstk/bind.c:973:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (atBindErrorMsg, af_errmsg ("atBindSet"));
data/shapetools-1.4pl6/src/atfstk/bind.c:987:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_name, af_afname (nameList[i]));
data/shapetools-1.4pl6/src/atfstk/bind.c:988:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_type, af_aftype (nameList[i]));
data/shapetools-1.4pl6/src/atfstk/bind.c:993:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "  Bind set: %s[] (default)", nameList[i]);
data/shapetools-1.4pl6/src/atfstk/bind.c:1000:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (atBindErrorMsg, af_errmsg ("atBindSet"));
data/shapetools-1.4pl6/src/atfstk/bind.c:1005:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "  Bind set: %s[%d.%d] (vnum)", nameList[i], genNo, revNo);
data/shapetools-1.4pl6/src/atfstk/bind.c:1014:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (atBindErrorMsg, af_errmsg ("atBindSet"));
data/shapetools-1.4pl6/src/atfstk/bind.c:1019:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (aliasAttr, "%s=%s", AT_ATTALIAS, bindName);
data/shapetools-1.4pl6/src/atfstk/bind.c:1024:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (stMessage, "  Bind set: %s[%s] (alias)", nameList[i], bindName);
data/shapetools-1.4pl6/src/atfstk/bind.c:1031:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (atBindErrorMsg, af_errmsg ("atBindSet"));
data/shapetools-1.4pl6/src/atfstk/bind.c:1039:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "  Bind set: %s[%s:] (rule)", nameList[i], bindName);
data/shapetools-1.4pl6/src/atfstk/bind.c:1051:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "  Bind set: %s[%s] (date)", nameList[i], stWriteTime (date));
data/shapetools-1.4pl6/src/atfstk/bind.c:1119:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (atBindErrorMsg, af_errmsg ("atBindSet"));
data/shapetools-1.4pl6/src/atfstk/bind.c:1193:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (reqAttrs.af_syspath, af_afpath (pattern));
data/shapetools-1.4pl6/src/atfstk/bind.c:1205:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (atBindErrorMsg, af_errmsg ("atBindCache"));
data/shapetools-1.4pl6/src/atfstk/bind.c:1212:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_name, af_afname (nameList[i]));
data/shapetools-1.4pl6/src/atfstk/bind.c:1213:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_type, af_aftype (nameList[i]));
data/shapetools-1.4pl6/src/atfstk/bind.c:1218:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "  Bind cache: %s[] (default)", nameList[i]);
data/shapetools-1.4pl6/src/atfstk/bind.c:1225:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (atBindErrorMsg, af_errmsg ("atBindCache"));
data/shapetools-1.4pl6/src/atfstk/bind.c:1230:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "  Bind cache: %s[%d.%d] (vnum)", nameList[i], genNo, revNo);
data/shapetools-1.4pl6/src/atfstk/bind.c:1239:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (atBindErrorMsg, af_errmsg ("atBindCache"));
data/shapetools-1.4pl6/src/atfstk/bind.c:1245:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "  Bind cache: %s[%s:] (rule)", nameList[i], bindName);
data/shapetools-1.4pl6/src/atfstk/bind.c:1254:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "  Bind cache: %s[%d.%d] (cache key)", nameList[i], genNo, revNo);
data/shapetools-1.4pl6/src/atfstk/bind.c:1259:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (cacheKeyAttr, "%s=%s", AT_ATTCACHEKEY, bindName);
data/shapetools-1.4pl6/src/atfstk/bind.c:1264:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (atBindErrorMsg, af_errmsg ("atBindCache"));
data/shapetools-1.4pl6/src/atfstk/bind.c:1279:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (atBindErrorMsg, af_errmsg ("atBindCache"));
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:70:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_udattrs[0], AT_ATTALIAS);
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:73:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (reqAttrs.af_udattrs[0], attrValue);
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:96:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_udattrs[0], AT_ATTCACHEKEY);
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:99:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (reqAttrs.af_udattrs[0], attrValue);
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:121:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (reqAttrs.af_host, attrValue);
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:168:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (reqAttrs.af_name, attrValue);
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:204:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (reqAttrs.af_syspath, attrValue);
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:208:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (reqAttrs.af_type, attrValue);
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:229:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_udattrs[0], AT_ATTALIAS);
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:232:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (reqAttrs.af_udattrs[0], attrValue);
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:243:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (reqAttrs.af_udattrs[0], attrName);
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:246:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (reqAttrs.af_udattrs[0], attrValue);
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:253:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (atBindErrorMsg, af_errmsg ("atBindAttrAbsolute"));
data/shapetools-1.4pl6/src/atfstk/bind_options.c:50:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No baseline specified -- '%s' ignored.", option);
data/shapetools-1.4pl6/src/atfstk/bind_options.c:68:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "cannot scan baseline -- '%s' option ignored.", option);
data/shapetools-1.4pl6/src/atfstk/bind_options.c:103:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No rule specified -- '%s' ignored.", option);
data/shapetools-1.4pl6/src/atfstk/bind_options.c:116:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "Cannot recognize rule body -- taking '%s' argument as rule name", option);
data/shapetools-1.4pl6/src/atfstk/bind_options.c:128:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No rule file name specified -- '%s' ignored.", option);
data/shapetools-1.4pl6/src/atfstk/bind_options.c:133:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "while loading %s: %s", arg, atBindErrorMsg);
data/shapetools-1.4pl6/src/atfstk/bind_options.c:211:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(t, path);
data/shapetools-1.4pl6/src/atfstk/bind_options.c:231:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (newArgv[newArgc], path);
data/shapetools-1.4pl6/src/atfstk/bind_options.c:233:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (newArgv[newArgc], newArg);
data/shapetools-1.4pl6/src/atfstk/bind_options.c:237:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (newArgv[newArgc], newArg);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:63:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (ruleFileName, envPtr);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:64:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (ruleFileName, ST_ENV_SHAPELIB);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:66:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (ruleFileName, BIND_RULES_FILENAME);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:153:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (bindRules[ruleCount].name, name);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:162:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (bindRules[ruleCount].body, body);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:169:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (sourceBuf, source);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:357:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (atBindErrorMsg, fileName);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:372:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (atBindErrorMsg, fileName);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:386:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (fileNameBuf, fileName);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:533:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (atBindErrorMsg, af_errmsg ("ruleExpandMacro"));
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:597:20:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if ((fileDes = popen (ptr, "r")) == NULL) {
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:676:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (myRuleName, ruleName);
data/shapetools-1.4pl6/src/atfstk/bind_scan.c:90:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "\n%s:%d: ERROR in bind rule -- %s%s%s",
data/shapetools-1.4pl6/src/atfstk/bind_scan.c:1023:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "# from file %s (line %d)", rule->fileName, rule->srcLine);
data/shapetools-1.4pl6/src/atfstk/bind_scan.c:1028:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "# ERROR -- %s", bindRuleErrorMsgs[rule->status]);
data/shapetools-1.4pl6/src/atfstk/bind_scan.c:1034:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "%s (", rule->name);
data/shapetools-1.4pl6/src/atfstk/bind_scan.c:1037:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "%s, ", rule->argList[i]);
data/shapetools-1.4pl6/src/atfstk/bind_scan.c:1040:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "%s):-", rule->argList[i]);
data/shapetools-1.4pl6/src/atfstk/bind_scan.c:1044:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "%s:-", rule->name);
data/shapetools-1.4pl6/src/atfstk/bind_scan.c:1049:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "\t%s", alt->pattern ? alt->pattern : "*");
data/shapetools-1.4pl6/src/atfstk/bind_scan.c:1055:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, ";\n\t%s", alt->pattern ? alt->pattern : "*");
data/shapetools-1.4pl6/src/atfstk/bind_scan.c:1062:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, ",\n\t  %s    \t", predicates[pred->position].name);
data/shapetools-1.4pl6/src/atfstk/bind_scan.c:1071:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "(%s)", pred->args[0] ? pred->args[0] : "");
data/shapetools-1.4pl6/src/atfstk/bind_scan.c:1076:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "(%s, %s)", pred->args[0] ? pred->args[0] : "", pred->args[1] ? pred->args[1] : "");
data/shapetools-1.4pl6/src/atfstk/cache.c:35:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  (void) sprintf (keyBuf, "%s=%ld.%d.%d", AT_ATTCACHEKEY,
data/shapetools-1.4pl6/src/atfstk/citeattr.c:116:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat ((char *)dest, attrName);
data/shapetools-1.4pl6/src/atfstk/citeattr.c:126:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat ((char *)dest, attrValue);
data/shapetools-1.4pl6/src/atfstk/lock.c:41:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "empty %s.", msg);
data/shapetools-1.4pl6/src/atfstk/lock.c:47:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "cannot open '%s' -- empty %s.", &msgText[1], msg);
data/shapetools-1.4pl6/src/atfstk/lock.c:52:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "cannot stat '%s' -- empty %s.", &msgText[1], msg);
data/shapetools-1.4pl6/src/atfstk/lock.c:57:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "not enough memory for %s.", msg);
data/shapetools-1.4pl6/src/atfstk/lock.c:84:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (completeAttr, "%s=%s%s", attrName, prologue, attrText);
data/shapetools-1.4pl6/src/atfstk/lock.c:92:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (completeAttr, "%s%s", prologue, attrText);
data/shapetools-1.4pl6/src/atfstk/lock.c:127:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (prologue, "[%s]%s", timeStr, AT_STARTINTENT);
data/shapetools-1.4pl6/src/atfstk/lock.c:133:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (prologue, "[%s]%s", timeStr, AT_STARTDESCR);
data/shapetools-1.4pl6/src/atfstk/lock.c:139:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (prologue, "[%s]%s", timeStr, AT_STARTLOG);
data/shapetools-1.4pl6/src/atfstk/lock.c:188:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "Same %s as before for %s ?", commentLogText, af_retattr (aso, AF_ATTUNIXNAME));
data/shapetools-1.4pl6/src/atfstk/lock.c:199:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "Write %s for %s ?", commentLogText, af_retattr (aso, AF_ATTUNIXNAME));
data/shapetools-1.4pl6/src/atfstk/lock.c:214:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "starting up %s ...", edName);
data/shapetools-1.4pl6/src/atfstk/lock.c:216:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "%s %s", edName, tmpName);
data/shapetools-1.4pl6/src/atfstk/lock.c:217:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if (system (stMessage) == AT_NOSHELL) {
data/shapetools-1.4pl6/src/atfstk/lock.c:223:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "empty %s.", commentLogText);
data/shapetools-1.4pl6/src/atfstk/network.c:65:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (tmpPath, af_retattr (aso, AF_ATTSPATH));
data/shapetools-1.4pl6/src/atfstk/network.c:67:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (tmpPath, af_retattr (aso, AF_ATTNAME));
data/shapetools-1.4pl6/src/atfstk/network.c:71:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (tmpPath, typePtr);
data/shapetools-1.4pl6/src/atfstk/network.c:82:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (curPath, tmpPath);
data/shapetools-1.4pl6/src/atfstk/network.c:94:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (tmpPath, mountEntry->at_mnt_fsname);
data/shapetools-1.4pl6/src/atfstk/network.c:102:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (networkPath, tmpPath);
data/shapetools-1.4pl6/src/atfstk/network.c:104:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (networkPath, &realPath[dirNameLen]);
data/shapetools-1.4pl6/src/atfstk/network.c:107:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (networkPath, af_gethostname ());
data/shapetools-1.4pl6/src/atfstk/network.c:109:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (networkPath, realPath);
data/shapetools-1.4pl6/src/atfstk/network.c:113:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (networkPath, af_retattr (aso, AF_ATTUNIXNAME));
data/shapetools-1.4pl6/src/atfstk/network.c:120:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (networkPath, af_retattr (aso, AT_ATTCACHEKEY));
data/shapetools-1.4pl6/src/atfstk/network.c:124:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (networkPath, af_retattr (aso, AF_ATTVERSION));
data/shapetools-1.4pl6/src/atfstk/network.c:155:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (localPath, mountEntry->at_mnt_dir);
data/shapetools-1.4pl6/src/atfstk/network.c:161:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (localPath, &networkPath[dirNameLen]);
data/shapetools-1.4pl6/src/atfstk/network.c:164:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (localPath, strPtr+1);
data/shapetools-1.4pl6/src/atfstk/uda.c:82:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrBuf.af_syspath, af_retattr (aso, AF_ATTSPATH));
data/shapetools-1.4pl6/src/atfstk/uda.c:83:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrBuf.af_name, af_retattr (aso, AF_ATTNAME));
data/shapetools-1.4pl6/src/atfstk/uda.c:84:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrBuf.af_type, af_retattr (aso, AF_ATTTYPE));
data/shapetools-1.4pl6/src/atfstk/uda.c:93:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (commentLeader, valPtr);
data/shapetools-1.4pl6/src/atfstk/uda.c:114:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (logPtr, commentLeader);
data/shapetools-1.4pl6/src/atfstk/uda.c:118:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (logPtr, af_retattr (aso, AF_ATTBOUNDPATH));
data/shapetools-1.4pl6/src/atfstk/uda.c:124:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (logPtr, commentLeader);
data/shapetools-1.4pl6/src/atfstk/uda.c:127:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (logPtr, af_retattr (&tmpAso, AF_ATTVERSION));
data/shapetools-1.4pl6/src/atfstk/uda.c:131:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (logPtr, af_retattr (&tmpAso, AF_ATTSTIME));
data/shapetools-1.4pl6/src/atfstk/uda.c:134:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (logPtr, af_retattr (&tmpAso, AF_ATTAUTHOR));
data/shapetools-1.4pl6/src/atfstk/uda.c:137:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (logPtr, af_retattr (&tmpAso, AF_ATTSTATE));
data/shapetools-1.4pl6/src/atfstk/uda.c:152:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (logPtr, commentLeader);
data/shapetools-1.4pl6/src/atfstk/uda.c:171:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (logPtr, notePtr);
data/shapetools-1.4pl6/src/atfstk/uda.c:235:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (tmpPath, af_retattr (aso, AF_ATTSPATH));
data/shapetools-1.4pl6/src/atfstk/uda.c:236:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (tmpName, af_retattr (aso, AF_ATTNAME));
data/shapetools-1.4pl6/src/atfstk/uda.c:237:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (tmpType, af_retattr (aso, AF_ATTTYPE));
data/shapetools-1.4pl6/src/atfstk/uda.c:246:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (headerStr, af_retattr (aso, AF_ATTBOUND));
data/shapetools-1.4pl6/src/atfstk/uda.c:249:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (headerStr, af_retattr (aso, AF_ATTMTIME));
data/shapetools-1.4pl6/src/atfstk/uda.c:251:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (headerStr, af_retattr (aso, AF_ATTSTIME));
data/shapetools-1.4pl6/src/atfstk/uda.c:253:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (headerStr, af_retattr (aso, AF_ATTAUTHOR));
data/shapetools-1.4pl6/src/atfstk/uda.c:255:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (headerStr, af_retattr (aso, AF_ATTSTATE));
data/shapetools-1.4pl6/src/atfstk/uda.c:375:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (tmpAttr, AT_ATTCLEAD);
data/shapetools-1.4pl6/src/atfstk/uda.c:491:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrValue, attrMem);
data/shapetools-1.4pl6/src/atfstk/uda.c:554:18:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if ((cPipe = popen (attrValue+1, "r")) == (FILE *)NULL)
data/shapetools-1.4pl6/src/atfstk/uda.c:595:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (attrValue, attrMem);
data/shapetools-1.4pl6/src/atfstk/uda.c:607:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (resultPtr, atLocalPath (curVal));
data/shapetools-1.4pl6/src/atfstk/uda.c:618:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (resultPtr, atLocalPath (curVal));
data/shapetools-1.4pl6/src/atfstk/uda.c:625:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (attrValue, attrMem);
data/shapetools-1.4pl6/src/atfstk/uda.c:721:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (attrMem, "%s%c%s%s", attrName, AF_UDANAMDEL, valId, valPtr);
data/shapetools-1.4pl6/src/atfstk/uda.c:747:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (msgBuf, "Can't open attribute value file %s.", attrFileName);
data/shapetools-1.4pl6/src/atfstk/uda.c:752:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (msgBuf, "Can't open attribute value file %s.", attrFileName);
data/shapetools-1.4pl6/src/atfstk/uda.c:761:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (attrMem, "%s%d", attrName, AF_UDANAMDEL);
data/shapetools-1.4pl6/src/atfstk/uda.c:775:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (attrMem, "%s%d", attrName, AF_UDANAMDEL);
data/shapetools-1.4pl6/src/atfstk/uda.c:809:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (msgBuf, "Cannot open attribute file %s.", fileName);
data/shapetools-1.4pl6/src/atfstk/uda.c:815:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (msgBuf, "Couldn't stat attribute file %s.", fileName);
data/shapetools-1.4pl6/src/atfstk/user.c:55:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (fullName, userName);
data/shapetools-1.4pl6/src/atfstk/user.c:60:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (resultUser->af_userdomain, af_getdomain());
data/shapetools-1.4pl6/src/atfstk/user.c:76:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (resultUser->af_userdomain, af_getdomain());
data/shapetools-1.4pl6/src/atfstk/user.c:101:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (result, "%s@%s", user->af_username, user->af_userdomain);
data/shapetools-1.4pl6/src/atfstk/user.c:103:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (result, "%s@%s", user->af_username, user->af_userhost);
data/shapetools-1.4pl6/src/atfstk/user.c:105:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (result, user->af_username);
data/shapetools-1.4pl6/src/atfstk/vbind.c:40:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No version alias name -- '%s' ignored.", option);
data/shapetools-1.4pl6/src/atfstk/vbind.c:54:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No date specified -- '%s' ignored.", option);
data/shapetools-1.4pl6/src/atfstk/vbind.c:60:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "Invalid date specified -- '%s' ignored.", option);
data/shapetools-1.4pl6/src/atfstk/vbind.c:74:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No version number specified -- '%s' ignored.", option);
data/shapetools-1.4pl6/src/atfstk/vbind.c:100:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "This is %s version %s", stProgramName, atVersion());
data/shapetools-1.4pl6/src/atfstk/vbind.c:102:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "   using AtFS version %s", af_version());
data/shapetools-1.4pl6/src/atfstk/vbind.c:104:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "     and Sttk version %s.", stVersion());
data/shapetools-1.4pl6/src/atfstk/vbind.c:166:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "%s", ruleList[i++]);
data/shapetools-1.4pl6/src/atfstk/vbind.c:175:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "%s -- ok.", newArgv[i]);
data/shapetools-1.4pl6/src/atfstk/vbind.c:178:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "%s -- not found.", newArgv[i]);
data/shapetools-1.4pl6/src/atfstk/vbind.c:189:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "(%s) %s", newArgv[i], atBindErrorMsg);
data/shapetools-1.4pl6/src/atfstk/vbind.c:197:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "%s", af_retattr (&tmpKey, AF_ATTBOUND));
data/shapetools-1.4pl6/src/atfstk/version.c:53:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (aliasAttr, "%s=%s", AT_ATTALIAS, alias ? alias : "");
data/shapetools-1.4pl6/src/atfstk/version.c:55:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrBuf.af_syspath, af_retattr (aso, AF_ATTSPATH));
data/shapetools-1.4pl6/src/atfstk/version.c:56:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrBuf.af_name, af_retattr (aso, AF_ATTNAME));
data/shapetools-1.4pl6/src/atfstk/version.c:57:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrBuf.af_type, af_retattr (aso, AF_ATTTYPE));
data/shapetools-1.4pl6/src/atfstk/version.c:75:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (msgBuf, "version number alias %s already in use for: %s",
data/shapetools-1.4pl6/src/atfstk/version.c:121:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (aliasAttr, "%s=%s", AT_ATTALIAS, thisPtr);
data/shapetools-1.4pl6/src/shape/dkey.c:39:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (buffer, af_retattr (key, AF_ATTUNIXNAME));
data/shapetools-1.4pl6/src/shape/dkey.c:44:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (buffer, s);
data/shapetools-1.4pl6/src/shape/dkey.c:49:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (buffer, datebuf);
data/shapetools-1.4pl6/src/shape/dkey.c:79:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (buffer, s);
data/shapetools-1.4pl6/src/shape/dkey.c:197:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (q->keybuffer, KVERS);
data/shapetools-1.4pl6/src/shape/dkey.c:202:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (q->keybuffer, dis);
data/shapetools-1.4pl6/src/shape/dkey.c:257:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (edit_buffer, heritage[i]);
data/shapetools-1.4pl6/src/shape/dkey.c:263:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (q->keybuffer, dis);
data/shapetools-1.4pl6/src/shape/dkey.c:277:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (edit_buffer, expandmacro ("$(HOSTTYPE)"));
data/shapetools-1.4pl6/src/shape/dkey.c:279:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (edit_buffer, expandmacro ("$(hosttype)"));
data/shapetools-1.4pl6/src/shape/dkey.c:281:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (edit_buffer, af_getdomain());
data/shapetools-1.4pl6/src/shape/dkey.c:284:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (q->keybuffer, edit_buffer);
data/shapetools-1.4pl6/src/shape/files.c:54:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (pathlist[lastpath][0], namep ? namep + 1 : name);
data/shapetools-1.4pl6/src/shape/files.c:69:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (pathlist[lastpath][1], path);
data/shapetools-1.4pl6/src/shape/files.c:71:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (pathlist[lastpath][1], pathlist[lastpath][0]);
data/shapetools-1.4pl6/src/shape/files.c:86:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (actpath, curvpath[0]);
data/shapetools-1.4pl6/src/shape/files.c:89:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (actpath, curvpath[0]);
data/shapetools-1.4pl6/src/shape/files.c:91:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	  strcat (actpath, pathlist[i][1]);
data/shapetools-1.4pl6/src/shape/files.c:94:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (actpath, pathlist[i][1]);
data/shapetools-1.4pl6/src/shape/files.c:101:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (actpath, pathlist[i][1]);
data/shapetools-1.4pl6/src/shape/files.c:107:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (actpath, curvpath[0]);
data/shapetools-1.4pl6/src/shape/files.c:113:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (actpath, curvpath[0]);
data/shapetools-1.4pl6/src/shape/files.c:117:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (actpath, pathlist[i][1]);
data/shapetools-1.4pl6/src/shape/files.c:185:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(currentItem->unixName, unixName);
data/shapetools-1.4pl6/src/shape/files.c:208:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (tmpName, stTmpFile (af_retattr (restoreKey, AF_ATTSPATH)));
data/shapetools-1.4pl6/src/shape/files.c:210:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (tmpName, stTmpFile ("."));
data/shapetools-1.4pl6/src/shape/files.c:236:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access (unixName, R_OK) == 0) { /* unix File already exists */
data/shapetools-1.4pl6/src/shape/files.c:239:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (hiddenName, stTmpFile (af_retattr (restoreKey, AF_ATTSPATH)));
data/shapetools-1.4pl6/src/shape/files.c:241:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (hiddenName, stTmpFile (curvpath[0]));
data/shapetools-1.4pl6/src/shape/files.c:290:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (confid_list->string, name);
data/shapetools-1.4pl6/src/shape/files.c:311:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (clist->nextstring->string,name);
data/shapetools-1.4pl6/src/shape/files.c:500:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy (net_id, atNetworkPath (key));
data/shapetools-1.4pl6/src/shape/files.c:517:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  (void) sprintf (raw_repository_path, "%s/AtFS", path);
data/shapetools-1.4pl6/src/shape/files.c:518:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  (void) strcpy (raw_repository_path, path_to_net_id (raw_repository_path));
data/shapetools-1.4pl6/src/shape/files.c:524:12:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    (void) sscanf (raw_repository_path,
data/shapetools-1.4pl6/src/shape/files.c:528:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy (raw_repository_path, path_to_net_id (path));
data/shapetools-1.4pl6/src/shape/files.c:531:12:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    (void) sscanf (raw_repository_path,
data/shapetools-1.4pl6/src/shape/files.c:573:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (lname, name);
data/shapetools-1.4pl6/src/shape/files.c:585:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (bname, name);
data/shapetools-1.4pl6/src/shape/files.c:588:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (sysp, af_afpath (bname));
data/shapetools-1.4pl6/src/shape/files.c:592:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (buf.af_name, af_afname (bname));
data/shapetools-1.4pl6/src/shape/files.c:593:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (buf.af_type, af_aftype (bname));
data/shapetools-1.4pl6/src/shape/files.c:604:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (current_path, expandmacro (curvpath[i]));
data/shapetools-1.4pl6/src/shape/files.c:608:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (buf.af_syspath, curvpath[0]);
data/shapetools-1.4pl6/src/shape/files.c:610:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (buf.af_syspath, current_path);
data/shapetools-1.4pl6/src/shape/files.c:613:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (buf.af_syspath, current_path);
data/shapetools-1.4pl6/src/shape/files.c:617:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (buf.af_syspath, sysp);
data/shapetools-1.4pl6/src/shape/files.c:619:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (buf.af_syspath, curvpath[0]);
data/shapetools-1.4pl6/src/shape/files.c:653:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (actpath, buf.af_syspath);
data/shapetools-1.4pl6/src/shape/files.c:702:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (atBindRule, bind_rule);
data/shapetools-1.4pl6/src/shape/files.c:908:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(syspath,curvpath[0]);
data/shapetools-1.4pl6/src/shape/files.c:910:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(syspath,af_afpath(filename));
data/shapetools-1.4pl6/src/shape/files.c:971:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (roid, af_retattr (rkey, is_busy ? AF_ATTUNIXNAME : AF_ATTBOUND));
data/shapetools-1.4pl6/src/shape/files.c:974:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (roid, af_retattr (rkey, AF_ATTSPATH) + strlen (curvpath[0]) + 1);
data/shapetools-1.4pl6/src/shape/files.c:976:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (roid, af_retattr (rkey, is_busy ? AF_ATTUNIXNAME : AF_ATTBOUND));
data/shapetools-1.4pl6/src/shape/files.c:979:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (roid, af_retattr (rkey, AF_ATTSPATH));
data/shapetools-1.4pl6/src/shape/files.c:981:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (roid, af_retattr (rkey, is_busy ? AF_ATTUNIXNAME : AF_ATTBOUND));
data/shapetools-1.4pl6/src/shape/hash.c:158:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (current->entry, value);
data/shapetools-1.4pl6/src/shape/hash.c:172:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (current->entry, value);
data/shapetools-1.4pl6/src/shape/hash.c:192:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (lastname, name);
data/shapetools-1.4pl6/src/shape/hash.c:216:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	  (void) strcat (lastentry, *lastentry ? " " : "");
data/shapetools-1.4pl6/src/shape/hash.c:217:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	  (void) strcat (lastentry, lp->string);
data/shapetools-1.4pl6/src/shape/hash.c:237:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy (lastname_bak, lastname);
data/shapetools-1.4pl6/src/shape/hash.c:241:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy (lastname, lastname_bak);
data/shapetools-1.4pl6/src/shape/inherit.c:57:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(fullname,syspath);
data/shapetools-1.4pl6/src/shape/inherit.c:59:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(fullname,name);
data/shapetools-1.4pl6/src/shape/inherit.c:63:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(fullname,name);
data/shapetools-1.4pl6/src/shape/inherit.c:69:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(fullname,type);
data/shapetools-1.4pl6/src/shape/inherit.c:220:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (savepath, primary_target_name);
data/shapetools-1.4pl6/src/shape/inherit.c:230:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (name, primary_target_name);
data/shapetools-1.4pl6/src/shape/inherit.c:232:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (type, af_aftype (name));
data/shapetools-1.4pl6/src/shape/inherit.c:233:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (name, af_afname (name));
data/shapetools-1.4pl6/src/shape/inherit.c:238:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (derivation_key, ATTRNAME);
data/shapetools-1.4pl6/src/shape/inherit.c:240:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (derivation_key, do_key);
data/shapetools-1.4pl6/src/shape/inherit.c:256:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (name, af_afname (primary_target_name));
data/shapetools-1.4pl6/src/shape/inherit.c:257:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(name, suffix (this_rule->name));
data/shapetools-1.4pl6/src/shape/inherit.c:260:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void) sprintf (targetpath, "%s/%s\0", af_afpath (this_rule->name),
data/shapetools-1.4pl6/src/shape/inherit.c:266:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (type, af_aftype (name));
data/shapetools-1.4pl6/src/shape/inherit.c:267:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (name, af_afname (name));
data/shapetools-1.4pl6/src/shape/inherit.c:270:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (name, af_afname (this_rule->name));
data/shapetools-1.4pl6/src/shape/inherit.c:271:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (type, af_aftype (this_rule->name));
data/shapetools-1.4pl6/src/shape/inherit.c:276:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tmpPath, "%s/%s.%s", syspath, name, type);
data/shapetools-1.4pl6/src/shape/macro.c:56:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	  strcat(retval, this_vardef->vpath);
data/shapetools-1.4pl6/src/shape/macro.c:61:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	  strcat(retval, this_vardef->vpath);
data/shapetools-1.4pl6/src/shape/macro.c:68:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	  strcat(retval, this_vardef->vflags);
data/shapetools-1.4pl6/src/shape/macro.c:73:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	  strcat(retval, this_vardef->vflags);
data/shapetools-1.4pl6/src/shape/macro.c:80:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (macro, this_vardef->vmacros[j]);
data/shapetools-1.4pl6/src/shape/macro.c:108:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(retval,p1);
data/shapetools-1.4pl6/src/shape/macro.c:113:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(retval,p1);
data/shapetools-1.4pl6/src/shape/macro.c:195:13:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if ((fd = popen(y,"r")) == (FILE *) NIL)
data/shapetools-1.4pl6/src/shape/macro.c:232:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(curvpath[i],curvpath[0]);
data/shapetools-1.4pl6/src/shape/macro.c:245:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	  strcat(curvpath[i],string);
data/shapetools-1.4pl6/src/shape/macro.c:251:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(curvpath[i],string);
data/shapetools-1.4pl6/src/shape/macro.c:263:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(curvpath[i],curvpath[0]);
data/shapetools-1.4pl6/src/shape/macro.c:276:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	  strcat(curvpath[i],string);
data/shapetools-1.4pl6/src/shape/macro.c:283:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(curvpath[i],string);
data/shapetools-1.4pl6/src/shape/macro.c:395:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	   strcat (tluser, wen);
data/shapetools-1.4pl6/src/shape/macro.c:476:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (testmac, thisdef);
data/shapetools-1.4pl6/src/shape/macro.c:788:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(&macr[0],name);
data/shapetools-1.4pl6/src/shape/main.c:152:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(prev_dir,curvpath[0]);
data/shapetools-1.4pl6/src/shape/main.c:154:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(atfsdir,curvpath[0]);
data/shapetools-1.4pl6/src/shape/main.c:158:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(atfsdir,curvpath[0]);
data/shapetools-1.4pl6/src/shape/main.c:228:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(cmdtargets[k++],newav[i]);
data/shapetools-1.4pl6/src/shape/main.c:304:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (msg, cmd_line_vars[i]+1);
data/shapetools-1.4pl6/src/shape/misc.c:98:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(link_reg->fn, fn);
data/shapetools-1.4pl6/src/shape/misc.c:99:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(link_reg->newfn, newfn);
data/shapetools-1.4pl6/src/shape/misc.c:107:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(last_link->fn, fn);
data/shapetools-1.4pl6/src/shape/misc.c:108:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(last_link->newfn, newfn);
data/shapetools-1.4pl6/src/shape/parser.c:278:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(incpath, st_env) ;
data/shapetools-1.4pl6/src/shape/parser.c:279:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(incpath, ST_ENV_SHAPELIB) ;
data/shapetools-1.4pl6/src/shape/parser.c:281:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(incpath, curname->string) ;
data/shapetools-1.4pl6/src/shape/parser.c:467:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy (src_filename_buf, src_filename_ptr);
data/shapetools-1.4pl6/src/shape/produce.c:87:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      (void) strcpy (curdep, subst_char (this_dependent, '%', percent));
data/shapetools-1.4pl6/src/shape/produce.c:90:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (curdep, this_dependent);
data/shapetools-1.4pl6/src/shape/produce.c:111:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (raw_name, full_name);
data/shapetools-1.4pl6/src/shape/produce.c:127:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (this_prefix, last_slash ? last_slash + 1 : raw_name);
data/shapetools-1.4pl6/src/shape/produce.c:197:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		  strcat(comm, cur->name);
data/shapetools-1.4pl6/src/shape/produce.c:204:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy(hhh,rel_dep);
data/shapetools-1.4pl6/src/shape/produce.c:210:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy(hhh2, cur->name);
data/shapetools-1.4pl6/src/shape/produce.c:213:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		    strcat(hhh,hhh2p);
data/shapetools-1.4pl6/src/shape/produce.c:214:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		  strcat(comm, hhh);
data/shapetools-1.4pl6/src/shape/produce.c:230:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (target_name_prefix, name_prefix (rel_dep));
data/shapetools-1.4pl6/src/shape/produce.c:234:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy (curdep, cooked_dep (use_rule,
data/shapetools-1.4pl6/src/shape/produce.c:238:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy (curdep, get_dep (cur, 0));
data/shapetools-1.4pl6/src/shape/produce.c:247:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		    strcat (comm, roid ? roid : "");
data/shapetools-1.4pl6/src/shape/produce.c:251:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy (curdep, cooked_dep (use_rule,
data/shapetools-1.4pl6/src/shape/produce.c:255:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy (curdep, get_dep (cur, k++));
data/shapetools-1.4pl6/src/shape/produce.c:266:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy(curdep, cooked_dep (cur,
data/shapetools-1.4pl6/src/shape/produce.c:274:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		      strcat (comm, curdep);
data/shapetools-1.4pl6/src/shape/produce.c:277:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy (curdep, cooked_dep (cur,
data/shapetools-1.4pl6/src/shape/produce.c:295:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy(curdep, cooked_dep (cur,
data/shapetools-1.4pl6/src/shape/produce.c:303:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		      strcat (comm, curdep);
data/shapetools-1.4pl6/src/shape/produce.c:307:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy (curdep, cooked_dep (cur,
data/shapetools-1.4pl6/src/shape/produce.c:323:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(common_prefix, cur->name);
data/shapetools-1.4pl6/src/shape/produce.c:328:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(comm, common_prefix);
data/shapetools-1.4pl6/src/shape/produce.c:338:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(comm, st);
data/shapetools-1.4pl6/src/shape/produce.c:359:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		  strcat(comm, st);
data/shapetools-1.4pl6/src/shape/produce.c:375:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(comm,cmd);
data/shapetools-1.4pl6/src/shape/produce.c:476:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (fname, rel_dep);
data/shapetools-1.4pl6/src/shape/produce.c:483:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (command_processor, expandmacro ("$(SHELL)"));
data/shapetools-1.4pl6/src/shape/produce.c:487:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (x_command, expandmacro (curcmd->command));
data/shapetools-1.4pl6/src/shape/produce.c:491:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (expcmd, expand_command (x_command, current, fname));
data/shapetools-1.4pl6/src/shape/produce.c:549:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (type, af_aftype (do_name));
data/shapetools-1.4pl6/src/shape/produce.c:550:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (sysp, af_afpath (do_name));
data/shapetools-1.4pl6/src/shape/produce.c:552:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (buf.af_syspath, sysp);
data/shapetools-1.4pl6/src/shape/produce.c:554:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (buf.af_syspath, curvpath[0]);
data/shapetools-1.4pl6/src/shape/produce.c:556:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (buf.af_name, af_afname (do_name));
data/shapetools-1.4pl6/src/shape/produce.c:557:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (buf.af_type, af_aftype (do_name));
data/shapetools-1.4pl6/src/shape/produce.c:634:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (retrv_attr, ATTRNAME);
data/shapetools-1.4pl6/src/shape/produce.c:636:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (retrv_attr, do_key);
data/shapetools-1.4pl6/src/shape/produce.c:721:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (messg, "shape - don't know how to shape %s",
data/shapetools-1.4pl6/src/shape/produce.c:1057:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy (bct_name, comm);
data/shapetools-1.4pl6/src/shape/rule.c:153:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (new_base, insertion);
data/shapetools-1.4pl6/src/shape/rule.c:154:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (new_base, position + replace_length);
data/shapetools-1.4pl6/src/shape/rule.c:163:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (base, new_base);
data/shapetools-1.4pl6/src/shape/rule.c:184:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(fname,name);
data/shapetools-1.4pl6/src/shape/rule.c:191:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (fname, d_suffix);
data/shapetools-1.4pl6/src/shape/rule.c:283:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cmdfield[j],newcomm);
data/shapetools-1.4pl6/src/shape/rule.c:301:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(depfield[1],targfield[i]);
data/shapetools-1.4pl6/src/shape/rule.c:305:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(targfield[1],p);
data/shapetools-1.4pl6/src/shape/rule.c:345:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(targfield[targnr], t);
data/shapetools-1.4pl6/src/shape/rule.c:384:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(depfield[depnr],t);
data/shapetools-1.4pl6/src/shape/rule.c:429:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(heritfield[heritnr],t);
data/shapetools-1.4pl6/src/shape/rule.c:451:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(cmdfield[cmdnr], t);
data/shapetools-1.4pl6/src/shape/rule.c:466:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cmdfield[cmdnr], string);
data/shapetools-1.4pl6/src/shape/rule.c:597:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			    strcat(current->deplist, depfield[kkk]);
data/shapetools-1.4pl6/src/shape/rule.c:628:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(current->name, targfield[i]);
data/shapetools-1.4pl6/src/shape/rule.c:665:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(current->firstdep, depfield[1]);
data/shapetools-1.4pl6/src/shape/rule.c:690:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy(current->deplist,depfield[j-xx]);
data/shapetools-1.4pl6/src/shape/rule.c:700:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		  strcat(current->deplist, depfield[j-xx]);
data/shapetools-1.4pl6/src/shape/rule.c:727:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		      strcpy(current->deplist,srcname);
data/shapetools-1.4pl6/src/shape/rule.c:736:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		      strcat(current->deplist,srcname);
data/shapetools-1.4pl6/src/shape/rule.c:753:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(current->heritage[j-1], heritfield[j]);
data/shapetools-1.4pl6/src/shape/rule.c:765:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(current->targetlist[j-1],targfield[j]);
data/shapetools-1.4pl6/src/shape/rule.c:778:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(curcmd->command, cmdfield[j]);
data/shapetools-1.4pl6/src/shape/rule.c:987:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  (void) strcat (result_str, substitution ? substitution : "");
data/shapetools-1.4pl6/src/shape/rule.c:993:12:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void) strcat (result_str, substitution ? substitution : "");
data/shapetools-1.4pl6/src/shape/rule.c:997:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  (void) strcat (result_str, c1);
data/shapetools-1.4pl6/src/shape/rule.c:1021:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  (void) strcpy (interim, template);
data/shapetools-1.4pl6/src/shape/rule.c:1030:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  (void) strcat (result_str, s_str);
data/shapetools-1.4pl6/src/shape/rule.c:1035:12:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void) strcat (result_str, s_str);
data/shapetools-1.4pl6/src/shape/rule.c:1039:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  (void) strcat (result_str, c1);
data/shapetools-1.4pl6/src/shape/rule.c:1379:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (targ_edit, targ);
data/shapetools-1.4pl6/src/shape/rule.c:1385:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (targ_edit, suff);
data/shapetools-1.4pl6/src/shape/rule.c:1386:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (default_dependency_line, targ_edit);
data/shapetools-1.4pl6/src/shape/rule.c:1389:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (default_dependency_line, this_target);
data/shapetools-1.4pl6/src/shape/rule.c:1400:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (targ_edit, targ);
data/shapetools-1.4pl6/src/shape/rule.c:1411:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (default_dependency_line, targ_edit);
data/shapetools-1.4pl6/src/shape/rule.c:1479:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (wild_stem, string);
data/shapetools-1.4pl6/src/shape/rule.c:1589:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (fname, targ);
data/shapetools-1.4pl6/src/shape/rule.c:1597:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void) sprintf (targrulename_with_path, "%s/%c%s%s", pathprefix,
data/shapetools-1.4pl6/src/shape/rule.c:1602:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  (void) sprintf (targrulename, "%c%s%s", '%', p ? "." : "", p ? p+1 : "");
data/shapetools-1.4pl6/src/shape/rule.c:1633:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	(void) strcat (cleaned_pattern, rpat);
data/shapetools-1.4pl6/src/shape/rule.c:1668:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat (wrng, stdruletab[implicit_suffs[i]]->name);
data/shapetools-1.4pl6/src/shape/rule.c:1670:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat (wrng, depname);
data/shapetools-1.4pl6/src/shape/shapeopt.c:65:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (shapeflags, opt);
data/shapetools-1.4pl6/src/shape/shapeopt.c:77:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (shapeflags, opt);
data/shapetools-1.4pl6/src/shape/shapeopt.c:90:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (shapeflags, opt);
data/shapetools-1.4pl6/src/shape/shapeopt.c:115:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(shapefiles->string,arg);
data/shapetools-1.4pl6/src/shape/shapeopt.c:129:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(shfiles->string, arg);
data/shapetools-1.4pl6/src/shape/shapeopt.c:152:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(forcelist[i],arg);
data/shapetools-1.4pl6/src/shape/shapeopt.c:154:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (shapeflags, opt);
data/shapetools-1.4pl6/src/shape/shapeopt.c:156:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (shapeflags, arg);
data/shapetools-1.4pl6/src/shape/shapeopt.c:185:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (shapeflags, opt);
data/shapetools-1.4pl6/src/shape/shapeopt.c:197:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (shapeflags, opt);
data/shapetools-1.4pl6/src/shape/shapeopt.c:209:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (shapeflags, opt);
data/shapetools-1.4pl6/src/shape/shapeopt.c:222:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (shapeflags, opt);
data/shapetools-1.4pl6/src/shape/shapeopt.c:234:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (shapeflags, opt);
data/shapetools-1.4pl6/src/shape/shapeopt.c:246:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (shapeflags, opt);
data/shapetools-1.4pl6/src/shape/shapeopt.c:258:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (shapeflags, opt);
data/shapetools-1.4pl6/src/shape/shapeopt.c:270:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ruleset,arg);
data/shapetools-1.4pl6/src/shape/shapeopt.c:272:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (shapeflags, opt);
data/shapetools-1.4pl6/src/shape/shapeopt.c:274:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (shapeflags, arg);
data/shapetools-1.4pl6/src/shape/shapeopt.c:287:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (shapeflags, opt);
data/shapetools-1.4pl6/src/shape/shapeopt.c:312:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (shapeflags, opt);
data/shapetools-1.4pl6/src/shape/shapeopt.c:326:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (shapeflags, opt);
data/shapetools-1.4pl6/src/shape/shapeopt.c:337:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(echomac,arg);
data/shapetools-1.4pl6/src/shape/shapeopt.c:370:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (vnp, arg);
data/shapetools-1.4pl6/src/shape/shapeopt.c:374:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (shapeflags, opt);
data/shapetools-1.4pl6/src/shape/shapeopt.c:376:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (shapeflags, arg);
data/shapetools-1.4pl6/src/shape/shapeopt.c:401:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (rbtarg, arg);
data/shapetools-1.4pl6/src/shape/shapeopt.c:402:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (rbfile, arg);
data/shapetools-1.4pl6/src/shape/shapeopt.c:407:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (rbfile, arg);
data/shapetools-1.4pl6/src/shape/shapeopt.c:408:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (rbtarg, arg);
data/shapetools-1.4pl6/src/shape/utils.c:78:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tmp, s) ;
data/shapetools-1.4pl6/src/shape/varsec.c:157:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (lvarname, varname+1);
data/shapetools-1.4pl6/src/shape/varsec.c:179:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (curvar[curi], lvarname);
data/shapetools-1.4pl6/src/shape/varsec.c:380:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (pathlist, variantDefs[varpos].vpath);
data/shapetools-1.4pl6/src/shape/varsec.c:388:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(curvpath[i],prev_dir);
data/shapetools-1.4pl6/src/shape/varsec.c:394:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(curvpath[i],pathlist);
data/shapetools-1.4pl6/src/shape/varsec.c:397:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(pathlist,ind);
data/shapetools-1.4pl6/src/shape/varsec.c:404:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(curvpath[i],prev_dir);
data/shapetools-1.4pl6/src/shape/varsec.c:410:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(curvpath[i],pathlist);
data/shapetools-1.4pl6/src/sttk/call.c:129:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "starting up %s %s...\n", editor, file);
data/shapetools-1.4pl6/src/sttk/call.c:242:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(cmdproc2, command_processor) ;
data/shapetools-1.4pl6/src/sttk/call.c:259:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(cmdproc2, command_processor) ;
data/shapetools-1.4pl6/src/sttk/call.c:307:2:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execvp(argv[0], argv) ;
data/shapetools-1.4pl6/src/sttk/files.c:69:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (tmpName, "%s/sttk%d%d", path, (int) getpid(), tmpCount++);
data/shapetools-1.4pl6/src/sttk/files.c:107:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access (programName, X_OK) == 0)
data/shapetools-1.4pl6/src/sttk/files.c:130:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (this, "%s/%s", dir, programName);	/* construct new filename */
data/shapetools-1.4pl6/src/sttk/files.c:131:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if ((access (this, F_OK)) == 0)
data/shapetools-1.4pl6/src/sttk/kbdio.c:95:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "Enter text, terminated with your EOF character%s:", eofMsg);
data/shapetools-1.4pl6/src/sttk/kbdio.c:169:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "%s:", stThisTransaction.tr_fname);
data/shapetools-1.4pl6/src/sttk/kbdio.c:194:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "%s [%s] ", message, defaultAnswer);
data/shapetools-1.4pl6/src/sttk/kbdio.c:202:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  sscanf (strbuf, "%s", answer);
data/shapetools-1.4pl6/src/sttk/mktime.c:264:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (dateBuf, timeStr);
data/shapetools-1.4pl6/src/sttk/mktime.c:288:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (timeBuf, asctime (localtime (&date)));
data/shapetools-1.4pl6/src/sttk/parseargs.c:93:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, " %s:", progname);
data/shapetools-1.4pl6/src/sttk/parseargs.c:113:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf (stMessage, buf, ' ');
data/shapetools-1.4pl6/src/sttk/parseargs.c:119:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, " %s", odesc[i].OptName);
data/shapetools-1.4pl6/src/sttk/parseargs.c:140:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	  sprintf (stMessage, buf, ' ');
data/shapetools-1.4pl6/src/sttk/parseargs.c:147:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, " [-%s <opt arg>]", odesc[i].OptName);
data/shapetools-1.4pl6/src/sttk/parseargs.c:154:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	  sprintf (stMessage, buf, ' ');
data/shapetools-1.4pl6/src/sttk/parseargs.c:161:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, " [-%s <arg>]", odesc[i].OptName);
data/shapetools-1.4pl6/src/sttk/parseargs.c:171:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf (stMessage, buf, ' ');
data/shapetools-1.4pl6/src/sttk/parseargs.c:174:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, " %s", extra_text ? extra_text : "");
data/shapetools-1.4pl6/src/sttk/strtab.c:107:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (strTabHash[where].symbol, symbol);
data/shapetools-1.4pl6/src/sttk/strtab.c:117:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (new->symbol, symbol);
data/shapetools-1.4pl6/src/sttk/ststring.c:105:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	 (void) strcpy (result, subject);
data/shapetools-1.4pl6/src/sttk/ststring.c:129:12:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	   (void) strcat (result, newStr);
data/shapetools-1.4pl6/src/sttk/ststring.c:171:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy (buf, str);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:131:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr, msg);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:150:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(namefmt, "%s: %s\n", progname, format);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:151:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr, namefmt, str);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:159:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(namefmt, "%s: %s\n", progname, format);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:160:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr, namefmt, str1, str2);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:406:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(buf, "%s %s", rcsprog, file);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:408:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(buf, "%s -%s %s", rcsprog, flags, file);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:409:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp,"Running ``%s''...\n", buf);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:412:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(tmp, "Start of ``%s''", buf);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:415:2:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	system(buf);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:417:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(tmp, "End of ``%s''", buf);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:435:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(buf, "%s %s %s", vcprog, qflag ? "-q" : "", file);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:437:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(buf, "%s -%s %s %s", vcprog, flags,
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:439:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp,"Running ``%s''...\n", buf);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:442:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(tmp, "Start of ``%s''", buf);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:445:2:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	system(buf);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:447:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(tmp, "End of ``%s''", buf);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:458:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if(access(atfsit ? "AtFS" : "RCS", 0) != 0){
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:479:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(tbuf, template_make);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:481:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(tbuf, template_man);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:483:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(tbuf, template_h);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:485:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(tbuf, template_c);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:487:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(tbuf, template_elisp);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:489:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(tbuf, template_sh);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:491:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(tbuf, template_shape);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:493:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(tbuf, template_f);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:607:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (tmpfile, "/tmp/%s%d", progname, (int) getpid());
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:611:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(tmp, "...file (*++argv) = %s...", file);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:614:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if(access(file, 4) != 0)
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:632:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tfile, "%s/%s", tpath, tbuf);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:634:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if(access(tfile, 0) == 0 && tflag) {
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:650:6:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			  sprintf(tmp, header, "__Header", "__Log");
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:652:6:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			  sprintf(tmp, header, "Header", "Log");
data/shapetools-1.4pl6/src/vc/rcs2atfs/afind.c:40:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(attrs.af_syspath, dir) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/main.c:100:13:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	if ((out = popen(BOURNE_SHELL, "w")) == NULL) {
data/shapetools-1.4pl6/src/vc/rcs2atfs/main.c:109:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(out, SCRIPT_HEADER, "rcs2atfs-1.9") ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:44:22:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if ((rlog_pipe = popen(rlog_command, "r")) == NULL) {
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:211:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(rcsfile->description, input_line) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:351:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(rev->log_message, quoted_line) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:199:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(new, s) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:235:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tmp, s1) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:236:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(tmp, s2) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:237:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(tmp, s3) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:257:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tmp, s1) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:258:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(tmp, s2) ;
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:86:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "%s/%s", path, af_retattr (aso, AF_ATTBOUND));
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:88:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "%s", af_retattr (aso, AF_ATTBOUND));
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:127:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (destName, "%s/%s", busyLocation, af_retattr (aso, AF_ATTUNIXNAME));
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:129:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (destName, af_retattr (aso, AF_ATTUNIXNAME));
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:143:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access (busyLocation, W_OK) == 0) { /* may we create ? */
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:147:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "write permission for directory %s denied.", busyLocation);
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:163:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "%s and %s are identical, retrieve anyway ?",
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:172:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "%s not retrieved", af_retattr (aso, AF_ATTBOUND));
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:176:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access (destName, W_OK) < 0) {
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:177:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access (busyLocation, W_OK) == 0) {
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:183:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "%s write-protected, re-create it ?", destName);
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:191:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (stMessage, "no write permission for %s", destName);
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:203:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "%s exists and is writable. Overwrite it ?", destName);
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:215:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "%s", af_errmsg (af_retattr (aso, AF_ATTUNIXNAME)));
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:226:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf (stMessage, "Give up lock on %s and overwrite it ?", destName);
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:242:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf (stMessage, "%s exists and is writable. Overwrite it ?", destName);
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:257:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (tmpName, stTmpFile (busyLocation));
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:259:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "cannot create temporary file %s for writing.", tmpName);
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:264:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "%s/%s -> %s", path, af_retattr (aso, AF_ATTBOUND), destName);
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:266:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "%s -> %s", af_retattr (aso, AF_ATTBOUND), destName);
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:287:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "cannot link %s to %s.", tmpName, destName);
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:296:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "%s not retrieved", af_retattr (aso, AF_ATTBOUND));
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:323:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "%s", af_errmsg (af_retattr (aso, AF_ATTBOUND)));
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:331:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access (destName, W_OK) == 0) {
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:337:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "Writable %s exists, overwrite it ?", destName);
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:341:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    else if (access (busyLocation, W_OK) == 0) {
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:342:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access (destName, F_OK) == 0) {
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:348:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (stMessage, "Write access on %s denied. Overwrite it anyway ?", destName);
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:356:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "Can't create in %s", busyLocation);
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:362:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "%s", af_errmsg (af_retattr (aso, AF_ATTBOUND)));
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:375:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "%s already locked by %s.", destName, atUserName (locker));
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:377:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "%s not restored", af_retattr (aso, AF_ATTBOUND));
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:403:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (tmpName, stTmpFile (busyLocation));
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:405:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "cannot create temporary file %s for writing.", tmpName);
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:410:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "%s/%s -> %s", path, af_retattr (aso, AF_ATTBOUND), destName);
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:412:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "%s -> %s", af_retattr (aso, AF_ATTBOUND), destName);
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:433:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "cannot link %s to %s.", tmpName, destName);
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:476:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (reserveDate, "%s=%s", "rtime", af_retattr (&busyAso, AF_ATTCTIME));
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:479:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "Can't set reservation date for %s.", af_retattr (aso, AF_ATTUNIXNAME));
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:485:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "Can't set reservation date for %s (no memory).", af_retattr (aso, AF_ATTUNIXNAME));
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:491:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "%s not restored", stThisTransaction.tr_fname);
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:84:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No attributes file specified -- '%s' ignored.\n", option);
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:89:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "Destination path already set to %s -- '%s' ignored.", arg, option);
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:99:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "Destination path %s does not exist -- '%s' ignored.", arg, option);
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:104:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "Destination path %s is not a directory -- '%s' ignored.", arg, option);
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:116:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No intent message specified -- '%s' ignored.\n", option);
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:130:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "This is %s version %s", stProgramName, retrversion());
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:132:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, " using AtFStk version %s", atVersion());
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:134:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "         AtFS version %s", af_version());
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:136:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "     and Sttk version %s.", stVersion());
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:206:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "\ntoo late, %s already restored", stThisTransaction.tr_fname);
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:212:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "%s not restored", stThisTransaction.tr_fname);
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:220:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "%s not restored", stThisTransaction.tr_fname);
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:226:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "\n%s not restored", stThisTransaction.tr_fname);
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:273:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No checkout with lock to distant directory %s.", destPath);
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:311:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "%s: nothing found -- skipped.", newArgv[i]);
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:317:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (path, af_afpath (newArgv[i]));
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:322:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (stThisTransaction.tr_fname, af_retattr (&curKey, AF_ATTBOUND));
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:331:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (stMessage, "Cannot save changes for %s%s%s -- %s.", path, path[0] ? "/" : "",
data/shapetools-1.4pl6/src/vc/save/dosave.c:180:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "cannot open '%s' -- empty descriptive text.", &msgText[1]);
data/shapetools-1.4pl6/src/vc/save/dosave.c:185:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "cannot stat '%s' -- empty descriptive text.", &msgText[1]);
data/shapetools-1.4pl6/src/vc/save/dosave.c:222:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (intent, xintent);
data/shapetools-1.4pl6/src/vc/save/dosave.c:240:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (notetxt, rawnotetxt);
data/shapetools-1.4pl6/src/vc/save/dosave.c:248:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (edbuf, intent);
data/shapetools-1.4pl6/src/vc/save/dosave.c:249:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (edbuf, rawnotetxt);
data/shapetools-1.4pl6/src/vc/save/dosave.c:251:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (notetxt, edbuf);
data/shapetools-1.4pl6/src/vc/save/dosave.c:302:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (cmd, "%s %s", edname, tmpname);
data/shapetools-1.4pl6/src/vc/save/dosave.c:303:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "starting up %s ...", edname);
data/shapetools-1.4pl6/src/vc/save/dosave.c:305:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if (system (cmd) == NOSHELL) {
data/shapetools-1.4pl6/src/vc/save/dosave.c:319:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "couldn't stat tmp file '%s'.", tmpname);
data/shapetools-1.4pl6/src/vc/save/dosave.c:346:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (notetxt, intent);
data/shapetools-1.4pl6/src/vc/save/dosave.c:356:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (fnam, "%s%d-%d", stProgramName, (int) getpid(), serial++);
data/shapetools-1.4pl6/src/vc/save/dosave.c:362:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "A temporary copy of your log can be found in %s.", fnam);
data/shapetools-1.4pl6/src/vc/save/dosave.c:380:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "You must lock %s before saving.", af_retattr (key, AF_ATTBOUND));
data/shapetools-1.4pl6/src/vc/save/dosave.c:388:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "%s already locked by %s.",
data/shapetools-1.4pl6/src/vc/save/dosave.c:433:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (afname, af_afname (curName));
data/shapetools-1.4pl6/src/vc/save/dosave.c:434:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (aftype, af_aftype (curName));
data/shapetools-1.4pl6/src/vc/save/dosave.c:437:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "[%s]%s:", spath, curName);
data/shapetools-1.4pl6/src/vc/save/dosave.c:440:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "%s:", curName);
data/shapetools-1.4pl6/src/vc/save/dosave.c:453:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "symbolic name %s not known for %s.", fixString, curName);
data/shapetools-1.4pl6/src/vc/save/dosave.c:471:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "symbolic name %s already in use by %s[%s] -- ignored.",
data/shapetools-1.4pl6/src/vc/save/dosave.c:513:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (stMessage, "Can't set predecessor for fixed version of %s.", curName);
data/shapetools-1.4pl6/src/vc/save/dosave.c:542:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (stMessage, "WARNING: Can't reset original busy version link for %s.", curName);
data/shapetools-1.4pl6/src/vc/save/dosave.c:558:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (tmpAttr, AT_ATTINTENT);
data/shapetools-1.4pl6/src/vc/save/dosave.c:560:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	  strcat (tmpAttr, intent);
data/shapetools-1.4pl6/src/vc/save/dosave.c:571:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "%s not saved. %s ", curName, curName);
data/shapetools-1.4pl6/src/vc/save/dosave.c:588:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf (stMessage, "No permission to delete %s (locked by %s).", curName, atUserName (locker));
data/shapetools-1.4pl6/src/vc/save/dosave.c:597:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf (stMessage, "Cannot lock %s for deletion -- not deleted.", curName);
data/shapetools-1.4pl6/src/vc/save/dosave.c:653:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "can't set version number %d.%d for %s", vnumGen, vnumRev, curName);
data/shapetools-1.4pl6/src/vc/save/dosave.c:657:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "%s saved%s.", af_retattr (newkey, AF_ATTBOUND), changedFlag ? "" : " (no changes)");
data/shapetools-1.4pl6/src/vc/save/dosave.c:677:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "No permission to delete %s (locked by %s).", curName, atUserName (locker));
data/shapetools-1.4pl6/src/vc/save/dosave.c:686:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "Cannot lock %s for deletion -- not deleted.", curName);
data/shapetools-1.4pl6/src/vc/save/dosave.c:694:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (stMessage, "cannot remove %s", curName);
data/shapetools-1.4pl6/src/vc/save/dosave.c:699:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "%s removed.", curName);
data/shapetools-1.4pl6/src/vc/save/dosave.c:713:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "Cannot lock generation %d of %s.",
data/shapetools-1.4pl6/src/vc/save/dosave.c:716:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "Cannot lock %s-history.", curName);
data/shapetools-1.4pl6/src/vc/save/save.c:73:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No binding specified -- '-%s' ignored.\n", option);
data/shapetools-1.4pl6/src/vc/save/save.c:82:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "invalid binding -- '-%s' ignored.\n", option);
data/shapetools-1.4pl6/src/vc/save/save.c:103:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "invalid alias name -- '-%s' ignored.\n", option);
data/shapetools-1.4pl6/src/vc/save/save.c:112:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "invalid version number -- '-%s' ignored.\n", option);
data/shapetools-1.4pl6/src/vc/save/save.c:144:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No log message specified -- '-%s' ignored.\n", option);
data/shapetools-1.4pl6/src/vc/save/save.c:156:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No attributes file specified -- '-%s' ignored.\n", option);
data/shapetools-1.4pl6/src/vc/save/save.c:167:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "This is %s version %s", stProgramName, saveversion());
data/shapetools-1.4pl6/src/vc/save/save.c:169:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "using AtFStk version %s", atVersion());
data/shapetools-1.4pl6/src/vc/save/save.c:171:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "        AtFS version %s", af_version());
data/shapetools-1.4pl6/src/vc/save/save.c:173:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "    and Sttk version %s.", stVersion());
data/shapetools-1.4pl6/src/vc/save/save.c:231:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "\ntoo late, %s already saved", stThisTransaction.tr_fname);
data/shapetools-1.4pl6/src/vc/save/save.c:236:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "%s not saved", stThisTransaction.tr_fname);
data/shapetools-1.4pl6/src/vc/save/save.c:244:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "%s not saved", stThisTransaction.tr_fname);
data/shapetools-1.4pl6/src/vc/save/save.c:250:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "\n%s %ssaved", stThisTransaction.tr_fname,
data/shapetools-1.4pl6/src/vc/save/save.c:327:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "invalid version number or alias -- '-%s' ignored.\n", bindPtr);
data/shapetools-1.4pl6/src/vc/save/save.c:338:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "%s: nothing found -- skipped.", newArgv[i]);
data/shapetools-1.4pl6/src/vc/save/save.c:343:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (path, af_afpath (newArgv[i]));
data/shapetools-1.4pl6/src/vc/save/save.c:348:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (stThisTransaction.tr_fname, af_retattr (&curKey, AF_ATTUNIXNAME));
data/shapetools-1.4pl6/src/vc/save/save.c:354:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (stMessage, "Cannot save changes for %s%s%s -- %s.", path, path[0] ? "/" : "",
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:52:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "Cannot delete %s -- version status must be 'saved'.", asoName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:60:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "No permission to delete %s (locked by %s).", asoName, atUserName (locker));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:68:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "Cannot lock %s for deletion -- not deleted.", asoName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:76:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "Delete %s ?", asoName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:78:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "%s not deleted.", asoName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:84:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "Cannot delete %s -- %s.", asoName, af_errmsg ("af_rm"));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:88:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "%s deleted.", asoName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:123:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "Symbolic name %s not known for %s -- skipped.",
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:137:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (busyName, af_retattr (aso, AF_ATTUNIXNAME));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:145:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "%s not %sed -- no versions found.", asoName, opName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:147:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "Cannot %s %s -- generation %d does not exist.",
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:162:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (lockName, path);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:164:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (lockName, af_retattr (&lockAso, AF_ATTBOUND));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:167:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (lockName, af_retattr (&lockAso, AF_ATTBOUND));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:172:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "%s was already unlocked.", lockName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:191:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "Cannot lock %s -- %s.", asoName, af_errmsg ("af_lock"));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:218:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (reserveDate, "%s=%s", "rtime", af_retattr (aso, AF_ATTCTIME));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:221:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf (stMessage, "Can't set reservation date for %s.", busyName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:227:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (stMessage, "Can't set reservation date for %s (no memory).", busyName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:233:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "%s locked.", lockName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:246:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "%s unlocked.", lockName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:251:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "%s was already locked by us.", lockName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:258:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "%s is already locked by %s.", lockName, atUserName (locker));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:265:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "%s currently locked by %s. Break the lock ?",
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:273:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "/bin/mail %s", atUserName(locker));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:274:13:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	if ((pip = popen (stMessage, "w")) == NULL) {
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:288:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "%s unlocked.", lockName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:293:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "%s remains locked by %s.", lockName, atUserName (locker));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:299:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "%s is locked by %s.", lockName, atUserName (locker));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:319:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "Cannot change status of %s -- is a busy version.", asoName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:326:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "Cannot change status of %s -- locked by %s.",
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:334:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "Status of %s is 'frozen' -- cannot promote.", asoName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:343:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "Status of %s is 'saved' -- cannot unpromote.", asoName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:352:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "Status of %s already '%s' (better than desired status) -- not changed.", asoName, atWriteStatus (aso, TRUE));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:363:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "Cannot change status of %s -- cannot lock.", asoName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:378:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "Status of %s %s to '%s'.", asoName, actionName, atWriteStatus (aso, TRUE));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:397:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (busyName, af_retattr (aso, AF_ATTUNIXNAME));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:403:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "Cannot find first version of %s -- skipped.", asoName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:409:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (outName, path);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:411:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (outName, af_retattr (&tmpAso, AF_ATTBOUND));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:414:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (outName, af_retattr (&tmpAso, AF_ATTBOUND));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:417:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "Cannot set description for %s -- %s.", outName, atErrMsg);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:429:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "Cannot find most recent version of %s -- skipped.", asoName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:435:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (outName, path);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:437:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (outName, af_retattr (&tmpAso, AF_ATTBOUND));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:440:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (outName, af_retattr (&tmpAso, AF_ATTBOUND));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:444:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (stMessage, "Cannot set intent for %s -- %s.", outName, atErrMsg);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:451:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "Cannot set intent on %s -- locked by %s.", outName, atUserName (locker));
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:458:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "You must have a lock on %s to set change intention.", outName);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:468:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "Cannot set note for %s -- %s.", asoName, atErrMsg);
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:475:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "usage: %s -set {note|description|intent} <name>...", stProgramName);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:78:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "Too many actions (maximum number is %d) -- '%s' ignored.",
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:134:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No alias name specified -- '%s' ignored.\n", action);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:141:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "Too many aliases (maximum number is %d) -- '%s %s' ignored.",
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:151:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "Too many aliases (maximum number is %d) -- '%s %s' ignored.",
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:165:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No attribute specified -- '%s' ignored.\n", action);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:177:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No new author specified -- '%s' ignored.\n", action);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:182:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "New author already set to '%s' -- additional '%s' ignored.",
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:191:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "%s is not a valid user on this machine -- '%s' ignored.", arg, action);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:216:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "invalid mode '%s' -- '%s' ignored.", arg, action);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:228:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No new owner specified -- '%s' ignored.\n", action);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:233:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "New owner already set to '%s' -- additional '%s' ignored.",
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:242:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "%s is not a valid user on this machine -- '%s' ignored.", arg, action);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:260:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No attribute name specified -- '%s' ignored.\n", action);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:270:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (delAttrs[delAttrCount++], attrNamePtr);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:278:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "Cannot handle multiple lock/unlock actions -- '%s' ignored.", action);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:326:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "You already requested the new generation -- '%s' ignored.", action);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:340:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "You already requested the unpromote action -- '%s' ignored.", action);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:352:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "'%s' what ? No comment type specified -- '%s' ignored.\n",
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:358:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "Comment type already set to %s -- additional '%s' ignored.",
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:371:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No comment leader specified -- '%s' ignored.\n", action);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:376:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "Comment leader already set to '%s' -- additional '%s' ignored.",
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:382:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "Specified comment leader is too long -- '%s' ignored.", action);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:396:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "You already requested the promote action -- '%s' ignored.", action);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:411:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "This is %s", vadmversion());
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:413:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "  using %s,", atVersion());
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:415:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "        %s,", af_version());
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:417:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "    and %s.", stVersion());
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:478:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (asoName, path);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:485:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (asoName, af_retattr (aso, AF_ATTUNIXNAME));
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:487:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (asoName, af_retattr (aso, AF_ATTBOUND));
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:516:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  	sprintf (stMessage, "Cannot open new generation for %s -- %s.",
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:536:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (commentSymAttr, "%s=%s", AT_ATTCLEAD, newCommentLeader);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:538:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  	sprintf (stMessage, "Cannot set comment leader attribute '%s' for %s -- %s.",
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:548:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (stMessage, "Cannot set attribute file '%s' for %s -- %s.",
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:559:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "Attribute change '%s' for %s failed -- %s.",
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:568:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "Cannot delete attribute '%s' from %s -- %s.",
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:577:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (stMessage, "Cannot set version alias '%s' for %s -- %s.",
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:586:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (stMessage, "Cannot delete version alias '%s' for %s -- %s.",
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:595:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "Cannot change mode of %s -- %s.",
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:611:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "Cannot change author of %s -- %s.",
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:657:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (stMessage, "You may not specify any action parameter with '%s'.", stProgramName);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:712:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (path, af_afpath (lockString));
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:727:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "%s: nothing found -- skipped.", newArgv[i]);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:732:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (path, af_afpath (newArgv[i]));
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:739:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (stThisTransaction.tr_fname, af_retattr (&curKey, AF_ATTBOUND));
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:744:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (stMessage, "Cannot save changes for %s%s%s -- %s.",  path, path[0] ? "/" : "",
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:82:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "This is %s", vfversion());
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:84:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "  using %s,", atVersion());
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:86:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "        %s,", af_version());
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:88:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "    and %s.", stVersion());
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:186:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(symnameuda, "%s=%s", AT_ATTALIAS, (char *) exp->left);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:204:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (thisvers, val);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:214:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrs.af_syspath, af_afpath(thisvers));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:215:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrs.af_name, af_afname(thisvers));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:216:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (attrs.af_type, af_aftype(thisvers));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:257:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (sattrs.af_host, af_retattr (aso, AF_ATTHOST));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:258:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (sattrs.af_syspath, af_retattr (aso, AF_ATTSPATH));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:259:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (sattrs.af_name, af_retattr (aso, AF_ATTNAME));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:260:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (sattrs.af_type, af_retattr (aso, AF_ATTTYPE));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:262:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (symnameuda, "%s=%s", AT_ATTALIAS, (char *) exp->left);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:268:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(stMessage, "%s: af_find()", stProgramName);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:301:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (tattrs.af_host, af_retattr (aso, AF_ATTHOST));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:302:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (tattrs.af_syspath, af_retattr (aso, AF_ATTSPATH));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:303:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (tattrs.af_name, af_retattr (aso, AF_ATTNAME));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:304:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (tattrs.af_type, af_retattr (aso, AF_ATTTYPE));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:310:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (tattrs.af_owner.af_username, asoOwner->af_username);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:311:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (tattrs.af_owner.af_userdomain, asoOwner->af_userdomain);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:322:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(stMessage, "%s: af_find()", stProgramName);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:547:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (pathName, dirPrefix);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:549:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (pathName, af_retattr (aso, AF_ATTUNIXNAME));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:551:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (pathName, af_retattr (aso, AF_ATTBOUND));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:566:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "%s: fork failed\n", stProgramName);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:572:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execvp(pav[0], pav);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:873:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(attrs.af_syspath, name);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:877:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (prefix, "%s/", name);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:880:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (attrs.af_name, af_afpath(name));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:881:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (attrs.af_name, af_afname(name));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:882:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (attrs.af_type, af_aftype(name));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:887:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (thisaso, "%s/%s", S_ISDIR (buf.st_mode) ? name : af_afpath(name), AF_SUBDIR);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:893:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(stMessage, "%s: af_find(%s)", stProgramName, name);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:901:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(stMessage, "%s: cachefind(%s)", stProgramName, name);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:914:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(stMessage, "%s: af_setgkey()", stProgramName);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:953:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(prefix, "%s/", name);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:956:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (thisaso, af_retattr (dirs[i], AF_ATTUNIXNAME));
data/shapetools-1.4pl6/src/vc/vl/display.c:131:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (name, af_retattr (aso, AF_ATTUNIXNAME));
data/shapetools-1.4pl6/src/vc/vl/display.c:133:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (name, af_retattr (aso, AF_ATTBOUND));
data/shapetools-1.4pl6/src/vc/vl/display.c:137:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (name, af_retattr (aso, AF_ATTBOUND));
data/shapetools-1.4pl6/src/vc/vl/display.c:140:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (name, atFileClassExt (aso));
data/shapetools-1.4pl6/src/vc/vl/display.c:388:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (name, af_afname (hist));
data/shapetools-1.4pl6/src/vc/vl/display.c:389:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (type, af_aftype (hist));
data/shapetools-1.4pl6/src/vc/vl/display.c:430:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (histVinfo, af_retattr (&firstAso, AF_ATTVERSION));
data/shapetools-1.4pl6/src/vc/vl/display.c:434:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (histVinfo, af_retattr (&lastAso, AF_ATTVERSION));
data/shapetools-1.4pl6/src/vc/vl/display.c:465:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (histVinfo, atFileClassExt (&busyAso));
data/shapetools-1.4pl6/src/vc/vl/display.c:468:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (histVinfo, atFileClassExt (&lastAso));
data/shapetools-1.4pl6/src/vc/vl/display.c:521:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (attrBuf.af_name, af_afname(hist));
data/shapetools-1.4pl6/src/vc/vl/display.c:522:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (attrBuf.af_type, af_aftype(hist));
data/shapetools-1.4pl6/src/vc/vl/vl.c:107:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "You can specify only one format string -- add. '-%s' ignored.", option);
data/shapetools-1.4pl6/src/vc/vl/vl.c:148:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No attribute specified -- '-%s' ignored.", option);
data/shapetools-1.4pl6/src/vc/vl/vl.c:154:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "Too many attributes specified -- additional '-%s' ignored.", option);
data/shapetools-1.4pl6/src/vc/vl/vl.c:168:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "No bind name specified -- '-%s' ignored.", option);
data/shapetools-1.4pl6/src/vc/vl/vl.c:174:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "Too many bind names (-n,-V,-bind) specified -- '-%s' ignored.", option);
data/shapetools-1.4pl6/src/vc/vl/vl.c:209:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (stMessage, "Too many attribute names specified -- additional '-%s' ignored.", option);
data/shapetools-1.4pl6/src/vc/vl/vl.c:222:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "This is %s", vlversion());
data/shapetools-1.4pl6/src/vc/vl/vl.c:224:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "  using %s,", atVersion());
data/shapetools-1.4pl6/src/vc/vl/vl.c:226:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "        %s,", af_version());
data/shapetools-1.4pl6/src/vc/vl/vl.c:228:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (stMessage, "    and %s.", stVersion());
data/shapetools-1.4pl6/src/vc/vl/vl.c:421:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (nameList[nameIdx], path);
data/shapetools-1.4pl6/src/vc/vl/vl.c:423:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (nameList[nameIdx], histList[i]);
data/shapetools-1.4pl6/src/vc/vl/vl.c:426:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (nameList[nameIdx], histList[i]);
data/shapetools-1.4pl6/src/vc/vl/vl.c:429:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (nameList[nameIdx], nameExt);
data/shapetools-1.4pl6/src/vc/vl/vl.c:524:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (pathAddPtr+1, histList[i]);
data/shapetools-1.4pl6/src/vc/vl/vl.c:527:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (pathAddPtr, histList[i]);
data/shapetools-1.4pl6/src/vc/vl/vl.c:531:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "\n%s -- unreadable.", examineDir);
data/shapetools-1.4pl6/src/vc/vl/vl.c:593:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "%s -- unreadable.", newArgv[i]);
data/shapetools-1.4pl6/src/vc/vl/vl.c:605:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (examineDir, newArgv[i]);
data/shapetools-1.4pl6/src/vc/vl/vl.c:610:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (path, af_afpath (newArgv[i]));
data/shapetools-1.4pl6/src/vc/vl/vl.c:616:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	  strcat (name, type);
data/shapetools-1.4pl6/src/vc/vl/vl.c:627:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (examineDir, path);
data/shapetools-1.4pl6/src/vc/vl/vl.c:634:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "%s -- not found.", newArgv[i]);
data/shapetools-1.4pl6/src/vc/vl/vl.c:785:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (nameList[nameIdx], path);
data/shapetools-1.4pl6/src/vc/vl/vl.c:787:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (nameList[nameIdx], name);
data/shapetools-1.4pl6/src/vc/vl/vl.c:790:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (nameList[nameIdx], name);
data/shapetools-1.4pl6/src/vc/vl/vl.c:874:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (pathAddPtr+1, asoName);
data/shapetools-1.4pl6/src/vc/vl/vl.c:877:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (pathAddPtr, asoName);
data/shapetools-1.4pl6/src/vc/vl/vl.c:879:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (pathPattern, examineDir);
data/shapetools-1.4pl6/src/vc/vl/vl.c:882:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "\n%s -- unreadable.", examineDir);
data/shapetools-1.4pl6/src/vc/vl/vl.c:948:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (realName, newArgv[i]);
data/shapetools-1.4pl6/src/vc/vl/vl.c:951:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "%s -- unreadable.", newArgv[i]);
data/shapetools-1.4pl6/src/vc/vl/vl.c:963:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (examineDir, newArgv[i]);
data/shapetools-1.4pl6/src/vc/vl/vl.c:975:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (examineDir, af_afpath (newArgv[i]));
data/shapetools-1.4pl6/src/vc/vl/vl.c:982:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (stMessage, "%s -- not found.", newArgv[i]);
data/shapetools-1.4pl6/src/vc/vl/vl.c:990:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (pathPattern, newArgv[i]);
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:1338:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, nullable[-1] ? " nullable: yes\n" : " nullable: no\n");
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:2083:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(result + oldsize, new);
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:2511:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(dm->must, result);
data/shapetools-1.4pl6/vgrep-2.0/grep.c:577:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(stderr, USAGE, prog);
data/shapetools-1.4pl6/vgrep-2.0/grep.c:692:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(&keys[keycc], optarg);
data/shapetools-1.4pl6/vgrep-2.0/regex.c:482:36:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DEBUG_PRINT1(x) if (debug) printf (x)
data/shapetools-1.4pl6/vgrep-2.0/regex.c:483:41:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DEBUG_PRINT2(x1, x2) if (debug) printf (x1, x2)
data/shapetools-1.4pl6/vgrep-2.0/regex.c:484:45:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DEBUG_PRINT3(x1, x2, x3) if (debug) printf (x1, x2, x3)
data/shapetools-1.4pl6/vgrep-2.0/regex.c:485:49:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DEBUG_PRINT4(x1, x2, x3, x4) if (debug) printf (x1, x2, x3, x4)
data/shapetools-1.4pl6/vgrep-2.0/regex.c:4949:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy (errbuf, msg);
data/shapetools-1.4pl6/include/afconfig.h:390:5:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int	getopt		A((int argc, char **argv, char *optstring));
data/shapetools-1.4pl6/src/atfs/afconfig.h:390:5:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int	getopt		A((int argc, char **argv, char *optstring));
data/shapetools-1.4pl6/src/atfs/afenviron.c:302:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  domainSym = getenv("ATFS_DOMAIN");
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1611:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((c = getopt (argc, argv, "Ceinqv")) != EOF) {
data/shapetools-1.4pl6/src/atfs/cacheadm.c:90:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((c = getopt (argc, argv, "A:N:T:qv")) != EOF) {
data/shapetools-1.4pl6/src/atfs/config.c:143:9:  [3] (buffer) getwd:
  This does not protect against buffer overflows by itself, so use with
  caution (CWE-120, CWE-20). Use getcwd instead.
  char *getwd();
data/shapetools-1.4pl6/src/atfs/config.c:148:11:  [3] (buffer) getwd:
  This does not protect against buffer overflows by itself, so use with
  caution (CWE-120, CWE-20). Use getcwd instead.
  return (getwd (buf));
data/shapetools-1.4pl6/src/atfs/config.h:364:5:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int	getopt		A((int argc, char **argv, char *optstring));
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:60:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!(envPtr = getenv (ST_ENV)))
data/shapetools-1.4pl6/src/atfstk/lock.c:211:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!(edName = getenv ("EDITOR")))
data/shapetools-1.4pl6/src/shape/files.c:775:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *hosttype = getenv ("HOSTTYPE"), *now = af_asctime(), *vp;
data/shapetools-1.4pl6/src/shape/macro.c:482:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    envval = getenv (thisdef);
data/shapetools-1.4pl6/src/shape/main.c:356:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      if ((enventry = getenv(name)) != NIL)
data/shapetools-1.4pl6/src/shape/parser.c:148:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    dump_parsed_definitions = getenv("SHAPE_PARSER_DUMP") ;
data/shapetools-1.4pl6/src/shape/parser.c:276:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if ((st_env = getenv(ST_ENV)) == 0)
data/shapetools-1.4pl6/src/sttk/files.c:114:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (!(path = getenv ("PATH")))
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:593:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if((rcsdir = getenv(atfsit ? "AtFSDIR" : "RCSDIR")) == NULL)
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:597:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if((!tflag) && ((tpath = getenv ("TEMPLATES")) != NULL))
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:600:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	   ((tpath = getenv("TEMPLATES")) == NULL))
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:601:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if((tpath = getenv("HOME")) == NULL)
data/shapetools-1.4pl6/src/vc/save/dosave.c:298:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  edname = getenv ("EDITOR");
data/shapetools-1.4pl6/src/vc/save/save.c:305:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    attrFile = getenv (SAVE_ATTRFILE);
data/shapetools-1.4pl6/vgrep-2.0/getopt.c:189:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char *getenv ();
data/shapetools-1.4pl6/vgrep-2.0/getopt.c:349:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      else if (getenv ("POSIXLY_CORRECT") != NULL)
data/shapetools-1.4pl6/vgrep-2.0/getopt.c:648:1:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
getopt (argc, argv, optstring)
data/shapetools-1.4pl6/vgrep-2.0/getopt.c:678:11:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
      c = getopt (argc, argv, "abc:d:0123456789");
data/shapetools-1.4pl6/vgrep-2.0/getopt.h:102:12:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
extern int getopt (int argc, char *const *argv, const char *shortopts);
data/shapetools-1.4pl6/vgrep-2.0/getopt.h:104:12:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
extern int getopt ();
data/shapetools-1.4pl6/vgrep-2.0/getopt.h:106:12:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
extern int getopt_long (int argc, char *const *argv, const char *shortopts,
data/shapetools-1.4pl6/vgrep-2.0/getopt.h:118:12:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
extern int getopt ();
data/shapetools-1.4pl6/vgrep-2.0/getopt.h:119:12:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
extern int getopt_long ();
data/shapetools-1.4pl6/vgrep-2.0/grep.c:627:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((opt = getopt(argc, argv, "0123456789A:B:CEFGVX:bce:f:hiLlnqsvwxy"))
data/shapetools-1.4pl6/include/afconfig.h:109:11:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
#  define vfork fork
data/shapetools-1.4pl6/include/afconfig.h:121:11:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
#  define vfork fork
data/shapetools-1.4pl6/include/afconfig.h:231:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define atSetmntent   fopen
data/shapetools-1.4pl6/include/afconfig.h:333:5:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int	open		A((const char *path, int oflag, ...));
data/shapetools-1.4pl6/include/afconfig.h:388:5:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
int	vfork		A((void));
data/shapetools-1.4pl6/src/atfs/afarchive.c:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char	          idstr[AF_IDSTRLEN+1], line[AF_LINESIZ];
data/shapetools-1.4pl6/src/atfs/afarchive.c:94:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    gen = atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:96:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    rev = atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:98:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    size = (size_t) atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:123:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    gen = atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:125:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    rev = atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:128:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    size = (size_t) atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:154:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          idstr[AF_SEGSTRLEN+1], *archiveName, line[AF_LINESIZ];
data/shapetools-1.4pl6/src/atfs/afarchive.c:167:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((dataArchFile = fopen (archiveName, "r")) == NULL) {
data/shapetools-1.4pl6/src/atfs/afarchive.c:181:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  arVersion = atoi (line);
data/shapetools-1.4pl6/src/atfs/afarchive.c:218:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          idstr[AF_IDSTRLEN+1], line[AF_LINESIZ];
data/shapetools-1.4pl6/src/atfs/afarchive.c:257:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  list->af_list[0].af_predgen = atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:259:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  list->af_list[0].af_predrev = atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:279:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  list->af_list[0].af_ltime = (time_t)atoi(itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:344:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_gen = atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:346:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_rev = atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:348:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_state = (short) atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:385:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_mtime = (time_t) atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:387:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_atime = (time_t) atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:389:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_ctime = (time_t) atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:391:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_stime = (time_t) atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:393:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_ltime = (time_t) atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:400:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_repr = (short) atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:402:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_fsize = (size_t) atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:404:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_dsize = (size_t) atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:406:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_succgen = atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:408:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_succrev = atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:410:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_predgen = atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:412:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_predrev = atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:427:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char	        idstr[AF_IDSTRLEN+1], line[AF_LINESIZ];
data/shapetools-1.4pl6/src/atfs/afarchive.c:450:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    gen = atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:452:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    rev = atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:513:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char	        idstr[AF_SEGSTRLEN+1], line[AF_LINESIZ];
data/shapetools-1.4pl6/src/atfs/afarchive.c:681:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  arVersion = atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:687:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  list->af_nrevs = atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:689:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  list->af_datasize = atoi (itemptr);
data/shapetools-1.4pl6/src/atfs/afarchive.c:782:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((attrTmpFile = fopen (attrTmpName, "w")) == NULL)
data/shapetools-1.4pl6/src/atfs/afarchive.c:904:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((dataTmpFile = fopen (dataTmpName, "w")) == NULL) {
data/shapetools-1.4pl6/src/atfs/afarchive.c:1000:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((attrTmpFile = fopen (attrTmpName, "r")) == NULL) {
data/shapetools-1.4pl6/src/atfs/afarchive.c:1033:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errMsg[PATH_MAX+256], *arBackupName;
data/shapetools-1.4pl6/src/atfs/afarlock.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   modeStr[4];
data/shapetools-1.4pl6/src/atfs/afarlock.c:60:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (modeStr, "w+");
data/shapetools-1.4pl6/src/atfs/afarlock.c:69:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((resultFile = (fopen (fileName, modeStr))) == NULL)
data/shapetools-1.4pl6/src/atfs/afarlock.c:75:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fileDes = open (fileName, openMode)) < 0) {
data/shapetools-1.4pl6/src/atfs/afarlock.c:148:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((resultFile = fopen (fileName, modeStr)) == NULL) {
data/shapetools-1.4pl6/src/atfs/afattrs.c:31:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char attrBuf[PATH_MAX];
data/shapetools-1.4pl6/src/atfs/afattrs.c:99:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmpBuf[16];
data/shapetools-1.4pl6/src/atfs/afattrs.c:106:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat (attrBuf, "[busy]");
data/shapetools-1.4pl6/src/atfs/afattrs.c:108:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmpBuf, "[%d.%d]", VATTR(aso).af_gen, VATTR(aso).af_rev);
data/shapetools-1.4pl6/src/atfs/afattrs.c:115:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmpBuf[16];
data/shapetools-1.4pl6/src/atfs/afattrs.c:118:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat (attrBuf, "[busy]");
data/shapetools-1.4pl6/src/atfs/afattrs.c:120:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (tmpBuf, "[%d.%d]", VATTR(aso).af_gen, VATTR(aso).af_rev);
data/shapetools-1.4pl6/src/atfs/afattrs.c:140:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (attrBuf, "busy");
data/shapetools-1.4pl6/src/atfs/afattrs.c:142:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (attrBuf, "%d", VATTR(aso).af_gen);
data/shapetools-1.4pl6/src/atfs/afattrs.c:148:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (attrBuf, "busy");
data/shapetools-1.4pl6/src/atfs/afattrs.c:150:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (attrBuf, "%d", VATTR(aso).af_rev);
data/shapetools-1.4pl6/src/atfs/afattrs.c:156:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (attrBuf, "busy");
data/shapetools-1.4pl6/src/atfs/afattrs.c:158:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (attrBuf, "%d.%d", VATTR(aso).af_gen, VATTR(aso).af_rev);
data/shapetools-1.4pl6/src/atfs/afattrs.c:165:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (attrBuf, "busy"); break;
data/shapetools-1.4pl6/src/atfs/afattrs.c:167:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (attrBuf, "saved"); break;
data/shapetools-1.4pl6/src/atfs/afattrs.c:169:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (attrBuf, "proposed"); break;
data/shapetools-1.4pl6/src/atfs/afattrs.c:171:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (attrBuf, "published"); break;
data/shapetools-1.4pl6/src/atfs/afattrs.c:173:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (attrBuf, "accessed"); break;
data/shapetools-1.4pl6/src/atfs/afattrs.c:175:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (attrBuf, "frozen"); break;
data/shapetools-1.4pl6/src/atfs/afattrs.c:192:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (attrBuf, "%lu", (unsigned long) VATTR(aso).af_dsize);
data/shapetools-1.4pl6/src/atfs/afattrs.c:197:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (attrBuf, "%lu", (unsigned long) VATTR(aso).af_fsize);
data/shapetools-1.4pl6/src/atfs/afattrs.c:202:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (attrBuf, "%o", (unsigned int) VATTR(aso).af_mode);
data/shapetools-1.4pl6/src/atfs/afattrs.c:470:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          *udalist[AF_MAXUDAS+1];
data/shapetools-1.4pl6/src/atfs/afcache.c:235:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msgBuf[PATH_MAX+64];
data/shapetools-1.4pl6/src/atfs/afcache.c:240:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msgBuf[PATH_MAX+64];
data/shapetools-1.4pl6/src/atfs/afcompar.c:345:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char af_udaname[AF_UDANAMLEN];
data/shapetools-1.4pl6/src/atfs/afconfig.h:109:11:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
#  define vfork fork
data/shapetools-1.4pl6/src/atfs/afconfig.h:121:11:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
#  define vfork fork
data/shapetools-1.4pl6/src/atfs/afconfig.h:231:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define atSetmntent   fopen
data/shapetools-1.4pl6/src/atfs/afconfig.h:333:5:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int	open		A((const char *path, int oflag, ...));
data/shapetools-1.4pl6/src/atfs/afconfig.h:388:5:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
int	vfork		A((void));
data/shapetools-1.4pl6/src/atfs/afdelta.c:48:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((busyfile = fopen (busykey->af_ldes->af_busyfilename, "r")) == NULL)
data/shapetools-1.4pl6/src/atfs/afdelta.c:88:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((busyfile = fopen (busykey->af_ldes->af_busyfilename,"r")) == NULL)
data/shapetools-1.4pl6/src/atfs/afdelta.c:129:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((delfile = fopen (delname, "r")) == NULL)
data/shapetools-1.4pl6/src/atfs/afdelta.c:176:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  register FILE   *tmpfile;
data/shapetools-1.4pl6/src/atfs/afdelta.c:204:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (data, VATTR(keyptr).af_data, (size_t) fsize);
data/shapetools-1.4pl6/src/atfs/afdelta.c:214:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((tmpfile = fopen (tmpname, "w")) == NULL)
data/shapetools-1.4pl6/src/atfs/afdelta.c:217:52:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      fwrite (data, (size_t) fsize, sizeof (char), tmpfile);
data/shapetools-1.4pl6/src/atfs/afdelta.c:218:13:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    fclose (tmpfile);
data/shapetools-1.4pl6/src/atfs/afdelta.c:237:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((tmpfile = fopen (tmpname, "r")) == NULL)
data/shapetools-1.4pl6/src/atfs/afdelta.c:239:51:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      fread (data, (size_t) fsize, sizeof (char), tmpfile);
data/shapetools-1.4pl6/src/atfs/afdelta.c:240:15:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      fclose (tmpfile);
data/shapetools-1.4pl6/src/atfs/afdelta.c:275:18:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  register FILE *tmpfile;
data/shapetools-1.4pl6/src/atfs/afdelta.c:385:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    tmpfile = fopen (tmpname, "r");
data/shapetools-1.4pl6/src/atfs/afdelta.c:386:85:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    fread (VATTR(predptr).af_data, (size_t) VATTR(predptr).af_fsize, sizeof (char), tmpfile);
data/shapetools-1.4pl6/src/atfs/afdelta.c:387:13:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    fclose (tmpfile);
data/shapetools-1.4pl6/src/atfs/afdelta.c:399:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (succdata, VATTR(keyptr).af_data, succsize);
data/shapetools-1.4pl6/src/atfs/afdelta.c:413:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    tmpfile = fopen (tmpname, "r");
data/shapetools-1.4pl6/src/atfs/afdelta.c:414:55:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    fread (succdata, (size_t)succsize, sizeof (char), tmpfile);
data/shapetools-1.4pl6/src/atfs/afdelta.c:415:13:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    fclose (tmpfile);
data/shapetools-1.4pl6/src/atfs/afdelta.c:425:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  tmpfile = fopen (tmpname, "r");
data/shapetools-1.4pl6/src/atfs/afdelta.c:426:45:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  fread (preddata, predsize, sizeof (char), tmpfile);
data/shapetools-1.4pl6/src/atfs/afdelta.c:427:11:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  fclose (tmpfile);
data/shapetools-1.4pl6/src/atfs/afdelta.c:434:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  tmpfile = fopen (tmpname, "r");
data/shapetools-1.4pl6/src/atfs/afdelta.c:435:45:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  fread (preddata, predsize, sizeof (char), tmpfile);
data/shapetools-1.4pl6/src/atfs/afdelta.c:436:11:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  fclose (tmpfile);
data/shapetools-1.4pl6/src/atfs/afdelta.c:453:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    tmpfile = fopen (tmpname, "r");
data/shapetools-1.4pl6/src/atfs/afdelta.c:454:85:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    fread (VATTR(predptr).af_data, (size_t) VATTR(predptr).af_dsize, sizeof (char), tmpfile);
data/shapetools-1.4pl6/src/atfs/afdelta.c:455:13:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    fclose (tmpfile);
data/shapetools-1.4pl6/src/atfs/afdeltaproc.c:98:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  tmpStr[16];
data/shapetools-1.4pl6/src/atfs/afdeltaproc.c:136:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  tmpStr[16];
data/shapetools-1.4pl6/src/atfs/afdeltaproc.c:181:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy ((char *)&cmd, deltaPtr, sizeof (cmd));
data/shapetools-1.4pl6/src/atfs/afdeltaproc.c:188:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy ((char*)&idx, deltaPtr, sizeof (idx));
data/shapetools-1.4pl6/src/atfs/afdeltaproc.c:193:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (newDeltaPtr, deltaPtr, (size_t) cmd.length);
data/shapetools-1.4pl6/src/atfs/afdeltaproc.c:218:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ftarg = fopen(targetfn, "w")) == NULL)
data/shapetools-1.4pl6/src/atfs/afdeltaproc.c:375:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmdStr[MAXCMDLEN];
data/shapetools-1.4pl6/src/atfs/afdeltaproc.c:402:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fdelta  = fopen (deltafn, "w");
data/shapetools-1.4pl6/src/atfs/afenviron.c:217:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hostName[HOST_MAX];
data/shapetools-1.4pl6/src/atfs/afenviron.c:233:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[512], *start, *p;
data/shapetools-1.4pl6/src/atfs/afenviron.c:235:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *fd = fopen("/etc/resolv.conf", "r");
data/shapetools-1.4pl6/src/atfs/afenviron.c:260:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[512], *start, *p;
data/shapetools-1.4pl6/src/atfs/afenviron.c:271:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = fopen("/etc/resolv.conf", "r");
data/shapetools-1.4pl6/src/atfs/afenviron.c:297:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char domainName[DOMAIN_MAX+1];
data/shapetools-1.4pl6/src/atfs/aferror.c:33:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char logName[USER_MAX] = "";
data/shapetools-1.4pl6/src/atfs/aferror.c:61:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char diagstr[265]; /* for diagnistics of AF_EMISC */
data/shapetools-1.4pl6/src/atfs/aferror.c:123:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((errfile = fopen (AF_ERRLOG, "a")) == NULL) {
data/shapetools-1.4pl6/src/atfs/aferror.c:135:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (logName, "--?--");
data/shapetools-1.4pl6/src/atfs/aferror.c:208:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((errfile = fopen (AF_ERRLOG, "a")) == NULL) {
data/shapetools-1.4pl6/src/atfs/aferror.c:220:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (logName, "--?--");
data/shapetools-1.4pl6/src/atfs/aferror.c:271:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char errMsg[256];
data/shapetools-1.4pl6/src/atfs/affiles.c:94:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((busyfile = fopen (busyname, "w")) == NULL)
data/shapetools-1.4pl6/src/atfs/affiles.c:123:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((file = fopen (key->af_ldes->af_busyfilename, mode)) == NULL)
data/shapetools-1.4pl6/src/atfs/affiles.c:144:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((file = fopen (tmpname, mode)) == NULL)
data/shapetools-1.4pl6/src/atfs/aflib.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            cont[BUFSIZ];
data/shapetools-1.4pl6/src/atfs/aflib.c:55:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((sfile = fopen (source, "r")) == (FILE *)0)
data/shapetools-1.4pl6/src/atfs/aflib.c:57:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((dfile = fopen (dest, "w")) == (FILE *) 0) {
data/shapetools-1.4pl6/src/atfs/aflib.c:60:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((dfile = fopen (dest, "w")) == (FILE *) 0) {
data/shapetools-1.4pl6/src/atfs/afnames.c:32:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *givenPath[8] = {NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL};
data/shapetools-1.4pl6/src/atfs/afnames.c:33:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *uniqPath[8] =  {NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL};
data/shapetools-1.4pl6/src/atfs/afnames.c:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char curPath[PATH_MAX], tmpPath[PATH_MAX];
data/shapetools-1.4pl6/src/atfs/afnames.c:165:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          tmpname[PATH_MAX];
data/shapetools-1.4pl6/src/atfs/afnames.c:188:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((infile = fopen (tmpname, "r"))) {
data/shapetools-1.4pl6/src/atfs/afnames.c:218:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char arName[PATH_MAX];
data/shapetools-1.4pl6/src/atfs/afnames.c:264:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char subdirName[PATH_MAX];
data/shapetools-1.4pl6/src/atfs/afnames.c:298:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char cName[PATH_MAX];
data/shapetools-1.4pl6/src/atfs/afnames.c:322:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uniqName[NAME_MAX+1];
data/shapetools-1.4pl6/src/atfs/afnames.c:325:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nameFragment[NAME_MAX-4];
data/shapetools-1.4pl6/src/atfs/afnames.c:350:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpname[PATH_MAX];
data/shapetools-1.4pl6/src/atfs/afnames.c:368:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char busyname[PATH_MAX];
data/shapetools-1.4pl6/src/atfs/afnames.c:392:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static   char afPath[PATH_MAX];
data/shapetools-1.4pl6/src/atfs/afnames.c:445:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static   char afname[PATH_MAX];
data/shapetools-1.4pl6/src/atfs/afnames.c:480:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static   char aftype[TYPE_MAX];
data/shapetools-1.4pl6/src/atfs/afobjcache.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errMsg[512];
data/shapetools-1.4pl6/src/atfs/afobjcache.c:62:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (errMsg, "maxPerAttr (%d) may not be bigger than maxPerName (%d)", maxPerAttr, maxPerName);
data/shapetools-1.4pl6/src/atfs/afobjcache.c:66:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (errMsg, "maxPerName (%d) may not be bigger than totalMax (%d)", maxPerName, totalMax);
data/shapetools-1.4pl6/src/atfs/afobjcache.c:70:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (errMsg, "maxPerName (%d) may not be bigger than %d (system limit)", maxPerName, AF_MAX_CACHED_PER_NAME);
data/shapetools-1.4pl6/src/atfs/afobjcache.c:78:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (errMsg, "cannot shrink derived object cache (yet)\n\t\t(current cache size is %d)", list->af_nrevs);
data/shapetools-1.4pl6/src/atfs/afobjcache.c:101:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char	  idStr[AF_SEGSTRLEN+1], line[AF_LINESIZ], *itemPtr;
data/shapetools-1.4pl6/src/atfs/afobjcache.c:102:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    cacheName[PATH_MAX], *udaBuf;
data/shapetools-1.4pl6/src/atfs/afobjcache.c:138:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    objCacheVersion = atoi (itemPtr);
data/shapetools-1.4pl6/src/atfs/afobjcache.c:145:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_nrevs = atoi (itemPtr);
data/shapetools-1.4pl6/src/atfs/afobjcache.c:147:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    afObjCacheMax = atoi (itemPtr);
data/shapetools-1.4pl6/src/atfs/afobjcache.c:149:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    afObjCacheNameNum = atoi (itemPtr);
data/shapetools-1.4pl6/src/atfs/afobjcache.c:151:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    afObjCacheAttrNum = atoi (itemPtr);
data/shapetools-1.4pl6/src/atfs/afobjcache.c:197:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_gen = atoi (itemPtr);
data/shapetools-1.4pl6/src/atfs/afobjcache.c:199:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_rev = atoi (itemPtr);
data/shapetools-1.4pl6/src/atfs/afobjcache.c:225:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_mtime = (time_t) atoi (itemPtr);
data/shapetools-1.4pl6/src/atfs/afobjcache.c:227:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_atime = (time_t) atoi (itemPtr);
data/shapetools-1.4pl6/src/atfs/afobjcache.c:229:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_ctime = (time_t) atoi (itemPtr);
data/shapetools-1.4pl6/src/atfs/afobjcache.c:231:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_stime = (time_t) atoi (itemPtr);
data/shapetools-1.4pl6/src/atfs/afobjcache.c:238:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_repr = (short) atoi (itemPtr);
data/shapetools-1.4pl6/src/atfs/afobjcache.c:240:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_fsize = (size_t) atoi (itemPtr);
data/shapetools-1.4pl6/src/atfs/afobjcache.c:242:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    list->af_list[i].af_dsize = (size_t) atoi (itemPtr);
data/shapetools-1.4pl6/src/atfs/afobjcache.c:309:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   *tmpName, cacheName[PATH_MAX], *attrList[AF_MAXUDAS+1], buf[BUFSIZ];
data/shapetools-1.4pl6/src/atfs/afobjcache.c:319:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((tmpFile = fopen (tmpName, "w")) == NULL)
data/shapetools-1.4pl6/src/atfs/afobjcache.c:378:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((tmpFile = fopen (tmpName, "r")) == NULL) {
data/shapetools-1.4pl6/src/atfs/afsattrs.c:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char internalbuf[1];
data/shapetools-1.4pl6/src/atfs/afsys.h:107:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char    *af_udalist[AF_UDANUM+1]; /* list of udattrs if # <= 8 */
data/shapetools-1.4pl6/src/atfs/aftmpfiles.c:31:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *tmpfilelist[OPEN_MAX];
data/shapetools-1.4pl6/src/atfs/afudattrs.c:427:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *udalist[AF_MAXUDAS+1];
data/shapetools-1.4pl6/src/atfs/atfs.h:61:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char	af_username[USER_MAX];
data/shapetools-1.4pl6/src/atfs/atfs.h:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	af_userhost[HOST_MAX];
data/shapetools-1.4pl6/src/atfs/atfs.h:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	af_userdomain[DOMAIN_MAX];
data/shapetools-1.4pl6/src/atfs/atfs.h:71:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	af_host[HOST_MAX]; 	/* hostname */
data/shapetools-1.4pl6/src/atfs/atfs.h:72:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	af_syspath[PATH_MAX];   /* system path */
data/shapetools-1.4pl6/src/atfs/atfs.h:73:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	af_name[NAME_MAX+1];	/* filename */
data/shapetools-1.4pl6/src/atfs/atfs.h:74:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	af_type[TYPE_MAX];	/* filename extension (type) */
data/shapetools-1.4pl6/src/atfs/atfs.h:88:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	*af_udattrs[AF_MAXUDAS+1]; /* user def. attributes */
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          newarname[PATH_MAX+1], line[AF_LINESIZ];
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:110:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char   name[NAME_MAX+1];
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:113:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((archfile = fopen (archname, "r")) == NULL) {
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:117:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((archfile = fopen (newarname, "r")) == NULL) {
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char strBuf[256], answer[10], *cp;
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:269:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char value[256];
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:309:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  value = atoi (&input.string[input.curPos]);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:347:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  value = atoi (&input.string[input.curPos]);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:400:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *sPtr, commandLine[2*PATH_MAX+32], *updateStr = "";
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:460:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((inFile = fopen (arFilename, "r"))) {
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:561:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((inFile = fopen (datFilename, "r"))) {
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:617:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    arVersion = atoi (&(attrIn.string[AF_SEGSTRLEN+1]));
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:927:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    arVersion = atoi (&(dataIn.string[AF_SEGSTRLEN+1]));
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1058:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((tmpFile = fopen (arTmpFilename, "w")) == NULL) {
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1140:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((tmpFile = fopen (datTmpFilename, "w")) == NULL) {
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1326:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *newArFullName, *newDatFullName, oldArFullName[PATH_MAX], oldDatFullName[PATH_MAX];
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1327:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char commandLine[PATH_MAX*4];
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1370:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *arPathPtr, attrArPath[PATH_MAX], commandLine[3*PATH_MAX+32];
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1371:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char curPath[PATH_MAX];
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1525:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[NAME_MAX+1];
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1652:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  char curPath[PATH_MAX];
data/shapetools-1.4pl6/src/atfs/atfsrepair.h:87:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    *uda[MAXUDAS];
data/shapetools-1.4pl6/src/atfs/cacheadm.c:93:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if ((maxCacheAttr = atoi (optarg)) < 0) {
data/shapetools-1.4pl6/src/atfs/cacheadm.c:99:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if ((maxCacheName = atoi (optarg)) < 0) {
data/shapetools-1.4pl6/src/atfs/cacheadm.c:108:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if ((maxCacheTotal = atoi (optarg)) < 0) {
data/shapetools-1.4pl6/src/atfs/config.c:41:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((slink = fopen (name, "w")) != NULL) {
data/shapetools-1.4pl6/src/atfs/config.h:107:11:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
#  define vfork fork
data/shapetools-1.4pl6/src/atfs/config.h:119:11:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
#  define vfork fork
data/shapetools-1.4pl6/src/atfs/config.h:205:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define atSetmntent   fopen
data/shapetools-1.4pl6/src/atfs/config.h:307:5:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int	open		A((const char *path, int oflag, ...));
data/shapetools-1.4pl6/src/atfs/config.h:362:5:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
int	vfork		A((void));
data/shapetools-1.4pl6/src/atfstk/attrs.c:36:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char classStr[4];
data/shapetools-1.4pl6/src/atfstk/attrs.c:156:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char fileMode[12];
data/shapetools-1.4pl6/src/atfstk/attrs.c:159:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  (void) sprintf(fileMode, " %c%c%c%c%c%c%c%c%c",
data/shapetools-1.4pl6/src/atfstk/attrs.c:210:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char resultTime[16];
data/shapetools-1.4pl6/src/atfstk/attrs.c:217:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (resultTime, "            ");
data/shapetools-1.4pl6/src/atfstk/attrs.c:257:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char name[PATH_MAX];
data/shapetools-1.4pl6/src/atfstk/bind.c:32:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char atBindErrorMsg[256];
data/shapetools-1.4pl6/src/atfstk/bind.c:110:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	  strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind.c:149:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind.c:229:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char aliasAttr[AT_MAXALIASLEN];
data/shapetools-1.4pl6/src/atfstk/bind.c:362:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (stMessage, " [%d.%d,cached]", af_retnumattr (&tmpKey, AF_ATTGEN), af_retnumattr (&tmpKey, AF_ATTREV));
data/shapetools-1.4pl6/src/atfstk/bind.c:367:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (stMessage, " [%d.%d]", af_retnumattr (&tmpKey, AF_ATTGEN), af_retnumattr (&tmpKey, AF_ATTREV));
data/shapetools-1.4pl6/src/atfstk/bind.c:384:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *pattern, patternBuf[PATH_MAX+AT_CACHEKEYLEN];
data/shapetools-1.4pl6/src/atfstk/bind.c:420:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (atBindErrorMsg, "invalid rule (syntax error in rule)");
data/shapetools-1.4pl6/src/atfstk/bind.c:447:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (atBindErrorMsg, "re_comp: ");
data/shapetools-1.4pl6/src/atfstk/bind.c:605:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy (atBindErrorMsg, "during execution of subprocess");
data/shapetools-1.4pl6/src/atfstk/bind.c:665:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy (atBindErrorMsg, "invalid rule (syntax error in rule)");
data/shapetools-1.4pl6/src/atfstk/bind.c:744:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     *bindName, aliasAttr[AT_MAXALIASLEN];
data/shapetools-1.4pl6/src/atfstk/bind.c:752:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind.c:817:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (atBindErrorMsg, "version number alias (symbolic name) does not uniquely identify version");
data/shapetools-1.4pl6/src/atfstk/bind.c:897:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (atBindErrorMsg, "internal error (should be never reached)");
data/shapetools-1.4pl6/src/atfstk/bind.c:923:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (atBindErrorMsg, "no name/pattern argument given (atBindSet)");
data/shapetools-1.4pl6/src/atfstk/bind.c:1157:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (atBindErrorMsg, "no name/pattern argument given (atBindCache)");
data/shapetools-1.4pl6/src/atfstk/bind.c:1185:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (atBindErrorMsg, "cannot bind cached objects by date (atBindCache)");
data/shapetools-1.4pl6/src/atfstk/bind.h:74:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char      *args[2];
data/shapetools-1.4pl6/src/atfstk/bind.h:96:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        *argList[BIND_MAX_RULEARGS];
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:66:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:79:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "cannot decipher access date");
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:92:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:106:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "cannot decipher create date");
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:116:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	reqAttrs.af_gen = atoi (attrValue);
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:153:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "cannot decipher lock date");
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:161:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "cannot decipher modification date");
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:179:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	reqAttrs.af_rev = atoi (attrValue);
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:184:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      reqAttrs.af_size = atoi (attrValue);
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:189:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "unknown version state");
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:197:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "cannot decipher save date");
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:225:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:239:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:420:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "cannot decipher access date");
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:433:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "cannot decipher create date");
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:443:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	numVal = atoi (attrValue);
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:456:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "cannot decipher lock date");
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:464:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "cannot decipher modification date");
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:479:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	numVal = atoi (attrValue);
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:486:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      numVal = atoi (attrValue);
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:493:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "unknown version state");
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:501:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "cannot decipher save date");
data/shapetools-1.4pl6/src/atfstk/bind_options.c:192:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_options.c:208:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_options.c:226:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_options.c:243:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	  strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_options.c:259:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *envPtr, ruleFileName[PATH_MAX];
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:106:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:138:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:150:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:159:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:166:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:292:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:356:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (atBindErrorMsg, "cannot find ");
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:365:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:371:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (atBindErrorMsg, "cannot open ");
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:383:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:408:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        *ruleArgs[BIND_MAX_RULEARGS];
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:422:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			  strcpy (atBindErrorMsg, "not enough memory"); \
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:433:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   attrNameBuf[256], *attrNamePtr, *attrBuf, numBuf[16];
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:439:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:471:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char numBuf[16];
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:474:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (numBuf, "%d", hitCount);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:491:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (numBuf, "%d", hitCount);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:569:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   resultBuf[10240];
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:576:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:599:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "error during popen");
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:657:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:665:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:673:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_scan.c:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ruleText[16];
data/shapetools-1.4pl6/src/atfstk/bind_scan.c:108:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (atBindErrorMsg, "rule scan error(s)");
data/shapetools-1.4pl6/src/atfstk/bind_scan.c:597:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char predName[16], *ptr, *newPtr;
data/shapetools-1.4pl6/src/atfstk/bind_scan.c:958:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/bind_scan.c:984:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	  strcpy (atBindErrorMsg, "not enough memory");
data/shapetools-1.4pl6/src/atfstk/cache.c:33:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char keyBuf[AT_CACHEKEYLEN];
data/shapetools-1.4pl6/src/atfstk/citeattr.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char attrName[AF_UDANAMLEN];
data/shapetools-1.4pl6/src/atfstk/citeattr.c:97:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      if (curPtr - startPtr) ((char *)dest)[stringEnd+(curPtr-startPtr)] = '\0';
data/shapetools-1.4pl6/src/atfstk/citeattr.c:115:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat ((char *)dest, "$__");
data/shapetools-1.4pl6/src/atfstk/citeattr.c:138:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    if (&buf[bufSize] - startPtr) ((char *)dest)[stringEnd + (&buf[bufSize] - startPtr)] = '\0';
data/shapetools-1.4pl6/src/atfstk/lock.c:46:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((txtFile = fopen (&msgText[1], "r")) == NULL) {
data/shapetools-1.4pl6/src/atfstk/lock.c:117:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char prologue[64], *timeStr = af_asctime(), *ptr;
data/shapetools-1.4pl6/src/atfstk/lock.c:205:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  tmpFile = fopen (tmpName, "w");
data/shapetools-1.4pl6/src/atfstk/lock.c:222:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((tmpFile = fopen (tmpName, "r")) == NULL) {
data/shapetools-1.4pl6/src/atfstk/network.c:37:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char networkPath[PATH_MAX+HOST_MAX+AT_CACHEKEYLEN];
data/shapetools-1.4pl6/src/atfstk/network.c:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *realPath, curPath[PATH_MAX], tmpPath[PATH_MAX];
data/shapetools-1.4pl6/src/atfstk/network.c:116:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat (networkPath, "@busy");
data/shapetools-1.4pl6/src/atfstk/network.c:132:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char localPath[PATH_MAX+AT_CACHEKEYLEN];
data/shapetools-1.4pl6/src/atfstk/read.c:118:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    memset((char *) desc_table[index], 0, sizeof(at_read_desc)) ;
data/shapetools-1.4pl6/src/atfstk/read.c:497:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(attrname, dp->ar_pos, endattr - dp->ar_pos) ;
data/shapetools-1.4pl6/src/atfstk/uda.c:17:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char logMem[8192];
data/shapetools-1.4pl6/src/atfstk/uda.c:18:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char headerStr[PATH_MAX*2];
data/shapetools-1.4pl6/src/atfstk/uda.c:77:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     *valPtr, *notePtr, *tmpPtr, commentLeader[32];
data/shapetools-1.4pl6/src/atfstk/uda.c:116:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (logPtr, "Log for ");
data/shapetools-1.4pl6/src/atfstk/uda.c:233:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpPath[PATH_MAX], tmpName[NAME_MAX], tmpType[TYPE_MAX], *retPtr;
data/shapetools-1.4pl6/src/atfstk/uda.c:245:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (headerStr, "$Header: ");
data/shapetools-1.4pl6/src/atfstk/uda.c:256:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat (headerStr, " $");
data/shapetools-1.4pl6/src/atfstk/uda.c:374:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpAttr[AT_CLEADMAXLEN+32];
data/shapetools-1.4pl6/src/atfstk/uda.c:386:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    gen = atoi (attrValue);
data/shapetools-1.4pl6/src/atfstk/uda.c:394:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    mode = atoi (attrValue);
data/shapetools-1.4pl6/src/atfstk/uda.c:409:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    rev = atoi (attrValue);
data/shapetools-1.4pl6/src/atfstk/uda.c:452:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *attrValue, *attrName, attrMem[AT_MAXATTRSIZE];
data/shapetools-1.4pl6/src/atfstk/uda.c:519:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((tmpFile = fopen (tmpFileName, "w")) == NULL) {
data/shapetools-1.4pl6/src/atfstk/uda.c:537:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    tmpFile = fopen (tmpFileName, "r");
data/shapetools-1.4pl6/src/atfstk/uda.c:639:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         attrFileName[PATH_MAX], msgBuf[PATH_MAX+64];
data/shapetools-1.4pl6/src/atfstk/uda.c:746:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((attrFile = fopen (attrFileName, "r")) == NULL) {
data/shapetools-1.4pl6/src/atfstk/uda.c:805:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msgBuf[PATH_MAX+64], *attrBuf, *attrPtr;
data/shapetools-1.4pl6/src/atfstk/uda.c:808:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((attrFile = fopen (fileName, "r")) == NULL) {
data/shapetools-1.4pl6/src/atfstk/uda.c:851:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char attrName[AF_UDANAMLEN];
data/shapetools-1.4pl6/src/atfstk/user.c:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fullName[USER_MAX+HOST_MAX+DOMAIN_MAX+2];
data/shapetools-1.4pl6/src/atfstk/user.c:96:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char result[USER_MAX+HOST_MAX+DOMAIN_MAX+2];
data/shapetools-1.4pl6/src/atfstk/vbind.c:92:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    bindExact.baselineGen = atoi (genPtr);
data/shapetools-1.4pl6/src/atfstk/vbind.c:94:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    bindExact.baselineRev = atoi (revPtr);
data/shapetools-1.4pl6/src/atfstk/version.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     aliasAttr[AT_MAXALIASLEN];
data/shapetools-1.4pl6/src/atfstk/version.c:68:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msgBuf[NAME_MAX + AT_MAXALIASLEN + 64];
data/shapetools-1.4pl6/src/atfstk/version.c:93:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char aliasAttr[AT_MAXALIASLEN];
data/shapetools-1.4pl6/src/shape/dkey.c:34:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buffer[PATH_MAX];
data/shapetools-1.4pl6/src/shape/dkey.c:35:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char datebuf[12], *s;
data/shapetools-1.4pl6/src/shape/dkey.c:48:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (datebuf, "%ld", af_rettimeattr (key, AF_ATTMTIME));
data/shapetools-1.4pl6/src/shape/dkey.c:66:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buffer[AT_MAXATTRSIZE];
data/shapetools-1.4pl6/src/shape/dkey.c:176:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char edit_buffer[AT_MAXATTRSIZE], *dis, *dependent_ids();
data/shapetools-1.4pl6/src/shape/dkey.c:271:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat (q->keybuffer, "};");
data/shapetools-1.4pl6/src/shape/files.c:29:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char actpath[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/files.c:30:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char dollarplus[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/files.c:31:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char *pathlist[MAXPATHLIST][2];
data/shapetools-1.4pl6/src/shape/files.c:33:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char *curvpath[MAXVPATH] = {NIL,NIL,NIL,NIL,NIL,NIL,NIL,NIL,
data/shapetools-1.4pl6/src/shape/files.c:61:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (pathlist[lastpath][1], "&$");
data/shapetools-1.4pl6/src/shape/files.c:198:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpName[PATH_MAX], hiddenName[PATH_MAX];
data/shapetools-1.4pl6/src/shape/files.c:222:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((tmp_fp = fopen (tmpName, "w")) == NULL)
data/shapetools-1.4pl6/src/shape/files.c:493:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char net_id[MYMAXNAMLEN], *empty_path = "";
data/shapetools-1.4pl6/src/shape/files.c:514:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char raw_repository_path[MYMAXNAMLEN], *at, *psuff, vbinding[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/files.c:515:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char cooked_repository_path[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/files.c:553:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char bname[MYMAXNAMLEN], sysp[MYMAXNAMLEN], lname[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/files.c:554:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char current_path[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/files.c:903:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char syspath[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/files.c:954:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char roid[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/hash.c:179:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LOCAL char lastname[LASTNAME_LEN], *lastentry = (char *)NIL;
data/shapetools-1.4pl6/src/shape/hash.c:233:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lastname_bak[LASTNAME_LEN], 
data/shapetools-1.4pl6/src/shape/inherit.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fullname[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/inherit.c:188:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *do_key, *syspath, name[NAME_MAX+1], type[NAME_MAX+1], *p;
data/shapetools-1.4pl6/src/shape/inherit.c:190:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char savepath[MYMAXNAMLEN], *targetpath, *derivation_key;
data/shapetools-1.4pl6/src/shape/inherit.c:244:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmpPath[PATH_MAX+1];
data/shapetools-1.4pl6/src/shape/macro.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char macro[2048];
data/shapetools-1.4pl6/src/shape/macro.c:45:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char retval[1024];
data/shapetools-1.4pl6/src/shape/macro.c:475:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (testmac, "$(");
data/shapetools-1.4pl6/src/shape/macro.c:509:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    rec_do_depth = atoi(value);
data/shapetools-1.4pl6/src/shape/macro.c:786:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char macr[32];
data/shapetools-1.4pl6/src/shape/macro.c:787:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(&macr[0],"$(");
data/shapetools-1.4pl6/src/shape/main.c:32:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char rbfile[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/main.c:33:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char prev_dir[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/main.c:37:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char shapeflags[2048];
data/shapetools-1.4pl6/src/shape/main.c:56:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char *cmdtargets[MAXCMDTARGETS];
data/shapetools-1.4pl6/src/shape/main.c:59:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char *cmd_line_vars[MAXCMDLINEVARS];
data/shapetools-1.4pl6/src/shape/main.c:64:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char *newarg[64];
data/shapetools-1.4pl6/src/shape/main.c:83:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  leak_log = fopen ("Shape_Leak.log", "w");
data/shapetools-1.4pl6/src/shape/main.c:113:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char atfsdir[PATH_MAX];
data/shapetools-1.4pl6/src/shape/main.c:155:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(atfsdir,"/AtFS");
data/shapetools-1.4pl6/src/shape/main.c:159:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(atfsdir,"/AFS");
data/shapetools-1.4pl6/src/shape/main.c:185:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[16];
data/shapetools-1.4pl6/src/shape/main.c:187:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    (void) sprintf (buf, "%d", (int) getpid());
data/shapetools-1.4pl6/src/shape/main.c:305:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat (msg, " is not a variant name");
data/shapetools-1.4pl6/src/shape/parser.c:256:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char incpath[PATH_MAX];	/* construct include file name here */
data/shapetools-1.4pl6/src/shape/parser.c:268:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (save_jmpbuf, jmp_toplevel, sizeof(jmp_buf)) ;
data/shapetools-1.4pl6/src/shape/parser.c:296:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (jmp_toplevel, save_jmpbuf, sizeof(jmp_buf)) ;
data/shapetools-1.4pl6/src/shape/parser.c:420:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char src_filename_buf[PATH_MAX];
data/shapetools-1.4pl6/src/shape/parser.c:638:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (save_jmpbuf, jmp_toplevel, sizeof(jmp_buf)) ;
data/shapetools-1.4pl6/src/shape/parser.c:647:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy (jmp_toplevel, save_jmpbuf, sizeof(jmp_buf)) ;
data/shapetools-1.4pl6/src/shape/parser.c:670:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (jmp_toplevel, save_jmpbuf, sizeof(jmp_buf)) ;
data/shapetools-1.4pl6/src/shape/parser.c:1090:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char quote_char[2] ;
data/shapetools-1.4pl6/src/shape/produce.c:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char rbrule[64];
data/shapetools-1.4pl6/src/shape/produce.c:41:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char rbtarg[64];
data/shapetools-1.4pl6/src/shape/produce.c:42:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char ruleset[32];
data/shapetools-1.4pl6/src/shape/produce.c:81:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char curdep[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/produce.c:104:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char this_prefix[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/produce.c:105:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char raw_name[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/produce.c:170:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char curdep[512], hhh[64], hhh2[64];
data/shapetools-1.4pl6/src/shape/produce.c:171:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char comm[MAXCMDLENGTH];
data/shapetools-1.4pl6/src/shape/produce.c:222:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char target_name_prefix[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/produce.c:457:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (rc, "%d", retcode);
data/shapetools-1.4pl6/src/shape/produce.c:472:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *expcmd, x_command[MAXCMDLENGTH], fname[MYMAXNAMLEN],
data/shapetools-1.4pl6/src/shape/produce.c:523:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char type[MYMAXNAMLEN], sysp[MYMAXNAMLEN], *retrv_attr;
data/shapetools-1.4pl6/src/shape/produce.c:605:29:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (busy_attrs.af_mtime == atol (ap)) {
data/shapetools-1.4pl6/src/shape/produce.c:718:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char messg[80];
data/shapetools-1.4pl6/src/shape/produce.c:1007:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int tfd = open ("...__tt", O_RDONLY | O_CREAT, S_IRUSR);
data/shapetools-1.4pl6/src/shape/produce.c:1052:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char bct_name[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/produce.c:1058:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	(void) strcat (bct_name, ".bct");
data/shapetools-1.4pl6/src/shape/produce.c:1059:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((cid = fopen (bct_name, "w")) == NULL)
data/shapetools-1.4pl6/src/shape/rule.c:50:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LOCAL char *targfield[MAXTARGS], *depfield[MAXDEPS], *cmdfield[MAXCMDS];
data/shapetools-1.4pl6/src/shape/rule.c:51:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LOCAL char *heritfield[MAXHERIT];
data/shapetools-1.4pl6/src/shape/rule.c:84:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char nth_dependent[PATH_MAX];
data/shapetools-1.4pl6/src/shape/rule.c:130:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tokbuf[LINELEN];
data/shapetools-1.4pl6/src/shape/rule.c:139:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tokbuf[LINELEN], *base = *baseaddr;
data/shapetools-1.4pl6/src/shape/rule.c:172:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char fname[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/rule.c:229:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char newcomm[1024];
data/shapetools-1.4pl6/src/shape/rule.c:304:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(targfield[1],"%.");
data/shapetools-1.4pl6/src/shape/rule.c:318:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char t[MAXRULELENGTH], string2[MAXRULELENGTH];
data/shapetools-1.4pl6/src/shape/rule.c:977:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char result_str[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/rule.c:1012:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char result_str[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/rule.c:1013:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char interim[MYMAXNAMLEN], s_str[3];
data/shapetools-1.4pl6/src/shape/rule.c:1051:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cur_tok[MYMAXNAMLEN], *next_tok;
data/shapetools-1.4pl6/src/shape/rule.c:1275:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char nth_dependent[PATH_MAX];
data/shapetools-1.4pl6/src/shape/rule.c:1351:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char default_dependency_line[2 * PATH_MAX], targ_edit[PATH_MAX],
data/shapetools-1.4pl6/src/shape/rule.c:1393:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat (default_dependency_line, ": ");
data/shapetools-1.4pl6/src/shape/rule.c:1465:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char wild_stem[STEMLEN];
data/shapetools-1.4pl6/src/shape/rule.c:1497:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char edit_buffer[32], *canonical_name;
data/shapetools-1.4pl6/src/shape/rule.c:1526:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (edit_buffer, "%d.%d", hasht, hasht_ext);
data/shapetools-1.4pl6/src/shape/rule.c:1528:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (edit_buffer, "%d", hasht);
data/shapetools-1.4pl6/src/shape/rule.c:1572:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[MYMAXNAMLEN], targrule_names[2][MYMAXNAMLEN],
data/shapetools-1.4pl6/src/shape/rule.c:1666:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char wrng[MYMAXNAMLEN + 18];
data/shapetools-1.4pl6/src/shape/rule.c:1667:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy (wrng, "(implicit ");
data/shapetools-1.4pl6/src/shape/rule.c:1669:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat (wrng, ") ");
data/shapetools-1.4pl6/src/shape/shape.h:92:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *heritage[MAXHERIT];
data/shapetools-1.4pl6/src/shape/shape.h:93:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *targetlist[MAXHERIT];
data/shapetools-1.4pl6/src/shape/shape.h:106:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char keybuffer[AT_MAXATTRSIZE];
data/shapetools-1.4pl6/src/shape/shape.h:131:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *vmacros[MAXVMACROS];
data/shapetools-1.4pl6/src/shape/shape.h:139:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *variants[MAXVARIANTS];
data/shapetools-1.4pl6/src/shape/shape.h:160:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char	*pathlist[MAXPATHLIST][2];
data/shapetools-1.4pl6/src/shape/shape.h:186:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char *cmd_line_vars[MAXCMDLINEVARS];
data/shapetools-1.4pl6/src/shape/shapeopt.c:28:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char cfname[MYMAXNAMLEN];
data/shapetools-1.4pl6/src/shape/shapeopt.c:29:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char echomac[32];
data/shapetools-1.4pl6/src/shape/shapeopt.c:30:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char *forcelist[10];
data/shapetools-1.4pl6/src/shape/shapeopt.c:398:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (rbrule, "bound_configuration_thread");
data/shapetools-1.4pl6/src/shape/shapeopt.c:403:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat (rbfile, ".bct");
data/shapetools-1.4pl6/src/shape/std.c:347:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    memset ((char *)stdruletab[k], 0, sizeof (struct rules));
data/shapetools-1.4pl6/src/shape/varsec.c:29:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char *curvar[MAXVARIANTS] = {"","","","","","","","",
data/shapetools-1.4pl6/src/shape/varsec.c:153:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char lvarname[64];
data/shapetools-1.4pl6/src/shape/varsec.c:368:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathlist[PATH_MAX];
data/shapetools-1.4pl6/src/sttk/call.c:101:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *argv[10];
data/shapetools-1.4pl6/src/sttk/call.c:106:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fid = fopen (file, "w")) == NULL) { /* create a file */
data/shapetools-1.4pl6/src/sttk/call.c:144:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fid = fopen (file, "r")) == NULL) {
data/shapetools-1.4pl6/src/sttk/call.c:286:25:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
    switch (child_pid = vfork()) {
data/shapetools-1.4pl6/src/sttk/call.c:362:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(&stCallCmdErrno, &child_status, sizeof(int)) ;
data/shapetools-1.4pl6/src/sttk/files.c:31:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *tmpNames[ST_MAX_TMPFILES];
data/shapetools-1.4pl6/src/sttk/files.c:64:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char tmpName[PATH_MAX+1];
data/shapetools-1.4pl6/src/sttk/files.c:101:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char this[PATH_MAX+1];
data/shapetools-1.4pl6/src/sttk/kbdio.c:32:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char  stMessage[ST_MSGLEN];
data/shapetools-1.4pl6/src/sttk/kbdio.c:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char eofMsg[30] ;
data/shapetools-1.4pl6/src/sttk/kbdio.c:93:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf (eofMsg, " or single '%c' on a line", termChar) ;
data/shapetools-1.4pl6/src/sttk/kbdio.c:181:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char strbuf[ST_MSGLEN], answer[ST_MSGLEN], *cp;
data/shapetools-1.4pl6/src/sttk/mktime.c:230:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dateBuf[32], *colonPtr, *startPtr, *endPtr, *p;
data/shapetools-1.4pl6/src/sttk/mktime.c:243:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    hours = atoi (startPtr);
data/shapetools-1.4pl6/src/sttk/mktime.c:248:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    mins = atoi (endPtr);
data/shapetools-1.4pl6/src/sttk/mktime.c:253:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      secs = atoi (endPtr);
data/shapetools-1.4pl6/src/sttk/mktime.c:286:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char timeBuf[64];
data/shapetools-1.4pl6/src/sttk/parseargs.c:88:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[ST_MSGLEN];
data/shapetools-1.4pl6/src/sttk/parseargs.c:101:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (stMessage, " [-");
data/shapetools-1.4pl6/src/sttk/parseargs.c:112:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buf, "\n%%%dc", nextlineoff);
data/shapetools-1.4pl6/src/sttk/parseargs.c:139:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (buf, "\n%%%dc", nextlineoff);
data/shapetools-1.4pl6/src/sttk/parseargs.c:153:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (buf, "\n%%%dc", nextlineoff);
data/shapetools-1.4pl6/src/sttk/parseargs.c:170:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (buf, "\n%%%dc", nextlineoff);
data/shapetools-1.4pl6/src/sttk/ststring.c:36:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char resultPattern[PATH_MAX+1];
data/shapetools-1.4pl6/src/sttk/sttk.h:126:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tr_fname[PATH_MAX+1];
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:97:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char	tfile[BUFSIZ];				/* template file */
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:98:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char	tbuf[BUFSIZ];				/* current tfile */
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char namefmt[100];
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:157:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char namefmt[100];
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:340:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[LENGTH];
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:342:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if((fdfrom = fopen(from, "r")) == NULL) {
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:345:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if((fdto = fopen(to, mode)) == NULL) {
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:400:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[LENGTH];
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:401:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[LENGTH];
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:431:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[LENGTH];
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:432:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[LENGTH];
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:501:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[LENGTH];
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:504:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 	tmpfile[32];
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:504:8:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	char 	tmpfile[32];
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:607:11:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	sprintf (tmpfile, "/tmp/%s%d", progname, (int) getpid());
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:617:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if((fdtmp = fopen(tmpfile, "w")) == NULL) {
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:617:21:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		if((fdtmp = fopen(tmpfile, "w")) == NULL) {
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:618:40:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
			fatal1("Cannot open tmpfile (%s).", tmpfile);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:638:16:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
			copy(tfile, tmpfile, "w");
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:639:15:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
			copy(file, tmpfile, "a");
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:658:15:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
			copy(file, tmpfile, "a");
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:661:8:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		copy(tmpfile, file, "w");
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:662:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		unlink(tmpfile);
data/shapetools-1.4pl6/src/vc/rcs2atfs/main.c:105:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((out = fopen(shellscript, "w")) == NULL) {
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:34:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char   input_line[LINELENGTH + 1] ;	/* line for reading from pipe */
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char iobuf[IOBUFLEN];
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *busyLocation, destName[PATH_MAX], tmpName[PATH_MAX], *contentsBuf;
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:141:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((newFile = fopen (destName, "r")) == NULL) {
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:258:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((tmpFile = fopen (tmpName, "w")) == NULL) {
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:404:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((tmpFile = fopen (tmpName, "w")) == NULL) {
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:202:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (stMessage, "\ncompletely stop retrieving (%d files pending) ?",
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:237:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *cp, **tmpArgv, **newArgv, path[PATH_MAX], tmpStr[16];
data/shapetools-1.4pl6/src/vc/save/dosave.c:86:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (stMessage, "There are no changes with respect to the previously saved version.\nSave anyway ?");
data/shapetools-1.4pl6/src/vc/save/dosave.c:96:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (stMessage, "Can't malloc %lu bytes.", (unsigned long) newSize);
data/shapetools-1.4pl6/src/vc/save/dosave.c:101:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (stMessage, "Can't malloc %lu bytes.", (unsigned long) oldSize);
data/shapetools-1.4pl6/src/vc/save/dosave.c:158:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (stMessage, "There are no changes with respect to the previously saved version.\nSave anyway ?");
data/shapetools-1.4pl6/src/vc/save/dosave.c:179:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((txtFile = fopen (&msgText[1], "r")) == NULL) {
data/shapetools-1.4pl6/src/vc/save/dosave.c:292:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    tfd = fopen (tmpname, "w");
data/shapetools-1.4pl6/src/vc/save/dosave.c:310:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((tmpfil = fopen (tmpname, "r")) == NULL) {
data/shapetools-1.4pl6/src/vc/save/dosave.c:354:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fnam[ST_MSGLEN];
data/shapetools-1.4pl6/src/vc/save/dosave.c:358:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fil = fopen (fnam, "w")) != NULL) {
data/shapetools-1.4pl6/src/vc/save/dosave.c:426:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *curName, afname[NAME_MAX], aftype[NAME_MAX], *note = NULL;
data/shapetools-1.4pl6/src/vc/save/dosave.c:460:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (stMessage, "invalid version number given with '-fix' option");
data/shapetools-1.4pl6/src/vc/save/dosave.c:573:14:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      (void) strcpy (stMessage, "left unchanged.");
data/shapetools-1.4pl6/src/vc/save/dosave.c:605:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	      (void) strcpy (stMessage, "-- cannot remove.");
data/shapetools-1.4pl6/src/vc/save/dosave.c:608:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy (stMessage, "not removed.");
data/shapetools-1.4pl6/src/vc/save/dosave.c:612:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy (stMessage, "removed.");
data/shapetools-1.4pl6/src/vc/save/save.c:93:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	fixGen = atoi (fixString);
data/shapetools-1.4pl6/src/vc/save/save.c:227:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (stMessage, "\ncompletely stop saving (%d files unsaved) ?",
data/shapetools-1.4pl6/src/vc/save/save.c:266:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *cp, **tmpArgv, **newArgv, path[PATH_MAX], *bindPtr;
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:105:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    busyName[PATH_MAX], lockName[PATH_MAX], hostname[HOST_MAX+1];
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:395:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    outName[PATH_MAX], busyName[PATH_MAX];
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:51:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LOCAL  char *newAlias[MAX_ALIASES] = {"","","",""};
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:52:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LOCAL  char *delAlias[MAX_ALIASES] = {"","","",""};
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:55:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LOCAL  char *newAttrs[MAX_ACTIONS] = {"","","","","","","","","","","","","","","","",};
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:58:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
LOCAL  char *delAttrs[MAX_ACTIONS] = {"","","","","","","","","","","","","","","",""};
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:306:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    lockGen = atoi (lockString);
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:474:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char asoName[PATH_MAX], commentSymAttr[AT_CLEADMAXLEN];
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:640:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *cp, **tmpArgv, **newArgv, path[PATH_MAX];
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:48:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char startDir[PATH_MAX]; /* dir at beginning of process */
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:52:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char dirPrefix[PATH_MAX];/* current path name prefix */
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:72:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if ((*opt) && !(maxDepth = atoi(opt)) && (*opt != '0')) {
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:184:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char symnameuda[AT_MAXALIASLEN+AF_UDANAMLEN+2];
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:195:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char thisvers[PATH_MAX + NAME_MAX + TYPE_MAX + 1];
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:210:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      attrs.af_gen = atoi(cp1); attrs.af_rev = atoi(cp2);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:210:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      attrs.af_gen = atoi(cp1); attrs.af_rev = atoi(cp2);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:254:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char symnameuda[AT_MAXALIASLEN+AF_UDANAMLEN+2];
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:542:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  *pav[128], *arg, pathName[PATH_MAX];
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:711:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return build(vfAtime, (Expr) atoi(val), (Expr) val);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:713:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return build(vfCtime, (Expr) atoi(val), (Expr) val);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:715:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return build(vfMtime, (Expr) atoi(val), (Expr) val);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:717:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return build(vfStime, (Expr) atoi(val), (Expr) val);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:719:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return build(vfLtime, (Expr) atoi(val), (Expr) val);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:725:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return build(vfTerminate, (Expr) atoi(val), (Expr) NULL);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:728:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return build(eq, (Expr) atoi(val), (Expr) atoi(cp));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:728:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return build(eq, (Expr) atoi(val), (Expr) atoi(cp));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:732:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return build(le, (Expr) atoi(val), (Expr) atoi(cp));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:732:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return build(le, (Expr) atoi(val), (Expr) atoi(cp));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:736:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return build(lt, (Expr) atoi(val), (Expr) atoi(cp));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:736:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return build(lt, (Expr) atoi(val), (Expr) atoi(cp));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:740:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return build(ge, (Expr) atoi(val), (Expr) atoi(cp));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:740:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return build(ge, (Expr) atoi(val), (Expr) atoi(cp));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:744:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return build(gt, (Expr) atoi(val), (Expr) atoi(cp));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:744:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return build(gt, (Expr) atoi(val), (Expr) atoi(cp));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:773:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return build(vfSize, (Expr) atoi(val), (Expr) NULL);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:855:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *prefix, thisaso[PATH_MAX+1];
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:931:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy ((char *) dirs[ndir++], (char *) &key, sizeof(Af_key));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:931:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      memcpy ((char *) dirs[ndir++], (char *) &key, sizeof(Af_key));
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:963:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    free((char *) dirs[i]);
data/shapetools-1.4pl6/src/vc/vl/display.c:128:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char name[NAME_MAX+1];
data/shapetools-1.4pl6/src/vc/vl/display.c:134:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (&name[strlen(name)-1], "-drvd]");
data/shapetools-1.4pl6/src/vc/vl/display.c:223:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char userStr[USER_MAX+1];
data/shapetools-1.4pl6/src/vc/vl/display.c:386:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[NAME_MAX+1], type[TYPE_MAX];
data/shapetools-1.4pl6/src/vc/vl/display.c:416:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char histVinfo[64];
data/shapetools-1.4pl6/src/vc/vl/display.c:438:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat (histVinfo, ",cached");
data/shapetools-1.4pl6/src/vc/vl/display.c:440:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat (histVinfo, ",busy");
data/shapetools-1.4pl6/src/vc/vl/display.c:446:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (histVinfo, "[cached,busy]");
data/shapetools-1.4pl6/src/vc/vl/display.c:448:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (histVinfo, "[]");
data/shapetools-1.4pl6/src/vc/vl/display.c:458:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (histVinfo, "[]");
data/shapetools-1.4pl6/src/vc/vl/display.c:502:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char userStr[USER_MAX+1], lockerStr[USER_MAX+1];
data/shapetools-1.4pl6/src/vc/vl/display.c:578:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char genStr[16];
data/shapetools-1.4pl6/src/vc/vl/display.c:612:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (genStr, "^%d..", gen);
data/shapetools-1.4pl6/src/vc/vl/display.c:614:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (genStr, "^%d..", gen);
data/shapetools-1.4pl6/src/vc/vl/display.c:616:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (genStr, "^%d,%d", gen, gen1);
data/shapetools-1.4pl6/src/vc/vl/display.c:618:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (genStr, "^%d  ", gen);
data/shapetools-1.4pl6/src/vc/vl/display.c:622:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (genStr, "^%d.", gen);
data/shapetools-1.4pl6/src/vc/vl/display.c:624:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (genStr, "^%d ", gen);
data/shapetools-1.4pl6/src/vc/vl/vl.c:45:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
EXPORT char examineDir[PATH_MAX];
data/shapetools-1.4pl6/src/vc/vl/vl.c:52:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *requiredAttrs[AF_MAXUDAS];/* -attr <attribute> */
data/shapetools-1.4pl6/src/vc/vl/vl.c:76:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *showAttrs[AF_MAXUDAS];
data/shapetools-1.4pl6/src/vc/vl/vl.c:561:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char **histList, path[PATH_MAX], *name;
data/shapetools-1.4pl6/src/vc/vl/vl.c:857:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *pathAddPtr, *asoName, pathPattern[PATH_MAX];
data/shapetools-1.4pl6/src/vc/vl/vl.c:880:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat (pathPattern, "/*");
data/shapetools-1.4pl6/src/vc/vl/vl.c:947:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char realName[PATH_MAX];
data/shapetools-1.4pl6/src/vc/vl/vl.c:949:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat (realName, "/*");
data/shapetools-1.4pl6/src/vc/vl/vl.c:989:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char pathPattern[PATH_MAX];
data/shapetools-1.4pl6/src/vc/vl/vl.c:991:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat (pathPattern, "/*");
data/shapetools-1.4pl6/src/vc/vl/vl.c:1031:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *auxArgv[4];
data/shapetools-1.4pl6/vgrep-2.0/alloca.c:127:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char align[ALIGN_SIZE];	/* To force sizeof(header).  */
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:2310:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      mp[i].in = (char **) malloc(sizeof *mp[i].in);
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:2519:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      ifree((char *) mp[i].in);
data/shapetools-1.4pl6/vgrep-2.0/getopt.c:183:31:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define	my_bcopy(src, dst, n)	memcpy ((dst), (src), (n))
data/shapetools-1.4pl6/vgrep-2.0/grep.c:56:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
extern int open(), read(), close();
data/shapetools-1.4pl6/vgrep-2.0/grep.c:645:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	out_after = atoi(optarg);
data/shapetools-1.4pl6/vgrep-2.0/grep.c:650:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	out_before = atoi(optarg);
data/shapetools-1.4pl6/vgrep-2.0/grep.c:697:34:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = strcmp(optarg, "-") != 0 ? fopen(optarg, "r") : stdin;
data/shapetools-1.4pl6/vgrep-2.0/kwset.c:102:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char delta[NCHAR];	/* Delta table for rapid search. */
data/shapetools-1.4pl6/vgrep-2.0/kwset.c:411:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char delta[NCHAR];
data/shapetools-1.4pl6/vgrep-2.0/kwset.h:25:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *beg[1];			/* Begin pointer for each submatch. */
data/shapetools-1.4pl6/vgrep-2.0/obstack.h:148:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char	contents[4];		/* objects begin here */
data/shapetools-1.4pl6/vgrep-2.0/obstack.h:298:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   bcopy (where, __o->next_free, __len);				\
data/shapetools-1.4pl6/vgrep-2.0/obstack.h:308:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   bcopy (where, __o->next_free, __len),				\
data/shapetools-1.4pl6/vgrep-2.0/obstack.h:408:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  bcopy (where, (h)->next_free, (h)->temp),				\
data/shapetools-1.4pl6/vgrep-2.0/obstack.h:415:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  bcopy (where, (h)->next_free, (h)->temp),				\
data/shapetools-1.4pl6/vgrep-2.0/regex.c:56:9:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#ifndef bcopy
data/shapetools-1.4pl6/vgrep-2.0/regex.c:57:9:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define bcopy(s, d, n)	memcpy ((d), (s), (n))
data/shapetools-1.4pl6/vgrep-2.0/regex.c:57:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define bcopy(s, d, n)	memcpy ((d), (s), (n))
data/shapetools-1.4pl6/vgrep-2.0/regex.c:91:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char re_syntax_table[CHAR_SET_SIZE];
data/shapetools-1.4pl6/vgrep-2.0/regex.c:223:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   bcopy (source, destination, osize),					\
data/shapetools-1.4pl6/vgrep-2.0/regex.c:1474:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char str[CHAR_CLASS_MAX_LENGTH + 1];
data/shapetools-1.4pl6/vgrep-2.0/regex.c:2255:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  range_start = ((unsigned char *) p)[-2];
data/shapetools-1.4pl6/vgrep-2.0/regex.c:2256:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  range_end   = ((unsigned char *) p)[0];
data/shapetools-1.4pl6/vgrep-2.0/regex.c:4721:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  return (char *) re_error_msg[(int) ret];
data/shapetools-1.4pl6/vgrep-2.0/search.c:45:8:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#undef bcopy
data/shapetools-1.4pl6/vgrep-2.0/search.c:46:9:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define bcopy(s, d, n) memcpy((d), (s), (n))
data/shapetools-1.4pl6/vgrep-2.0/search.c:46:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define bcopy(s, d, n) memcpy((d), (s), (n))
data/shapetools-1.4pl6/vgrep-2.0/search.c:122:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char trans[NCHAR];
data/shapetools-1.4pl6/vgrep-2.0/search.c:207:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(n, "^\\(");
data/shapetools-1.4pl6/vgrep-2.0/search.c:209:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(n, "\\(^\\|[^0-9A-Za-z_]\\)\\(");
data/shapetools-1.4pl6/vgrep-2.0/search.c:212:7:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      bcopy(pattern, n + i, size);
data/shapetools-1.4pl6/vgrep-2.0/search.c:216:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(n + i, "\\)\\([^0-9A-Za-z_]\\|$\\)");
data/shapetools-1.4pl6/vgrep-2.0/search.c:218:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(n + i, "\\)$");
data/shapetools-1.4pl6/vgrep-2.0/search.c:273:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(n, "^(");
data/shapetools-1.4pl6/vgrep-2.0/search.c:275:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(n, "(^|[^0-9A-Za-z_])(");
data/shapetools-1.4pl6/vgrep-2.0/search.c:278:7:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      bcopy(pattern, n + i, size);
data/shapetools-1.4pl6/vgrep-2.0/search.c:282:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(n + i, ")([^0-9A-Za-z_]|$)");
data/shapetools-1.4pl6/vgrep-2.0/search.c:284:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(n + i, ")$");
data/shapetools-1.4pl6/include/afconfig.h:335:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int	read		A((int filedes, void *buf, unsigned int nbyte));
data/shapetools-1.4pl6/include/afconfig.h:338:8:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
mode_t	umask		A((mode_t cmask));
data/shapetools-1.4pl6/include/afconfig.h:349:5:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int	fgetc		A((FILE *stream));
data/shapetools-1.4pl6/src/atfs/afarchive.c:59:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sptr = &line[strlen(line)]+1; /* move to next entry */
data/shapetools-1.4pl6/src/atfs/afarchive.c:355:5:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    fgetc (file); /* skip tab */
data/shapetools-1.4pl6/src/atfs/afarchive.c:381:5:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    fgetc (file); /* skip tab */
data/shapetools-1.4pl6/src/atfs/afarchive.c:396:5:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    fgetc (file); /* skip tab */
data/shapetools-1.4pl6/src/atfs/afarchive.c:442:3:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  getc (file); /* skip newline */
data/shapetools-1.4pl6/src/atfs/afarchive.c:470:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ((c = getc (file)) == '\0') {
data/shapetools-1.4pl6/src/atfs/afarchive.c:471:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  if ((c = getc (file)) == '\0')
data/shapetools-1.4pl6/src/atfs/afarchive.c:475:7:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      getc (file); /* skip trailing newline char */
data/shapetools-1.4pl6/src/atfs/afarchive.c:481:24:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ((udabuf[j] = getc (file)) == '\0') {
data/shapetools-1.4pl6/src/atfs/afarchive.c:487:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ((c = getc (file)) == '\0')
data/shapetools-1.4pl6/src/atfs/afarchive.c:500:5:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    getc (file); /* skip trailing newline char */
data/shapetools-1.4pl6/src/atfs/afarlock.c:67:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy (modeStr, "r");
data/shapetools-1.4pl6/src/atfs/afattrs.c:87:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat (attrBuf, ".");
data/shapetools-1.4pl6/src/atfs/afattrs.c:102:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat (attrBuf, ".");
data/shapetools-1.4pl6/src/atfs/afattrs.c:214:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      attrBuf[strlen(attrBuf)-1] = '\0';
data/shapetools-1.4pl6/src/atfs/afattrs.c:220:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      attrBuf[strlen(attrBuf)-1] = '\0';
data/shapetools-1.4pl6/src/atfs/afattrs.c:226:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      attrBuf[strlen(attrBuf)-1] = '\0';
data/shapetools-1.4pl6/src/atfs/afattrs.c:233:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	attrBuf[strlen(attrBuf)-1] = '\0';
data/shapetools-1.4pl6/src/atfs/afattrs.c:241:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	attrBuf[strlen(attrBuf)-1] = '\0';
data/shapetools-1.4pl6/src/atfs/afattrs.c:253:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((udattr = malloc ((unsigned) strlen(valptr) + sizeof(char))) == NULL)
data/shapetools-1.4pl6/src/atfs/afattrs.c:424:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if ((tmpuda = malloc ((unsigned) ((strlen (udaptr) + strlen (valptr) +2) * sizeof (char)))) == NULL)
data/shapetools-1.4pl6/src/atfs/afattrs.c:424:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if ((tmpuda = malloc ((unsigned) ((strlen (udaptr) + strlen (valptr) +2) * sizeof (char)))) == NULL)
data/shapetools-1.4pl6/src/atfs/afattrs.c:428:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      tail = strlen (tmpuda);
data/shapetools-1.4pl6/src/atfs/afattrs.c:505:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if ((attrbuf->af_udattrs[i] = malloc (strlen(udalist[i]) + sizeof(char))) == NULL)
data/shapetools-1.4pl6/src/atfs/afconfig.h:335:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int	read		A((int filedes, void *buf, unsigned int nbyte));
data/shapetools-1.4pl6/src/atfs/afconfig.h:338:8:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
mode_t	umask		A((mode_t cmask));
data/shapetools-1.4pl6/src/atfs/afconfig.h:349:5:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int	fgetc		A((FILE *stream));
data/shapetools-1.4pl6/src/atfs/afnames.c:193:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(tmpname);
data/shapetools-1.4pl6/src/atfs/afnames.c:232:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  oldUmask = umask (000);
data/shapetools-1.4pl6/src/atfs/afnames.c:273:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  umask (oldUmask);
data/shapetools-1.4pl6/src/atfs/afnames.c:326:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nameLen = strlen (unixName);
data/shapetools-1.4pl6/src/atfs/afnames.c:377:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (busyname, ".");
data/shapetools-1.4pl6/src/atfs/afnames.c:402:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (afPath[strlen(afPath)-1] == ']')
data/shapetools-1.4pl6/src/atfs/afnames.c:505:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	aftype [strlen (aftype) - sizeof (char)] = '\0';
data/shapetools-1.4pl6/src/atfs/afobjcache.c:256:5:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    fgetc (cacheFile); /* skip newline char */
data/shapetools-1.4pl6/src/atfs/afobjcache.c:264:24:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ((udaBuf[j] = fgetc (cacheFile)) == '\0') {
data/shapetools-1.4pl6/src/atfs/afobjcache.c:270:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ((c = fgetc (cacheFile)) == '\0')
data/shapetools-1.4pl6/src/atfs/afobjcache.c:289:5:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    fgetc (cacheFile); /* skip trailing newline char */
data/shapetools-1.4pl6/src/atfs/afsattrs.c:133:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(buf) + sizeof (char); /* length of string plus nullbyte */
data/shapetools-1.4pl6/src/atfs/afsattrs.c:142:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (VATTR(key).af_note, buf, len);
data/shapetools-1.4pl6/src/atfs/afsymtab.c:104:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  symlen = strlen (symbol) + sizeof (char);
data/shapetools-1.4pl6/src/atfs/afudattrs.c:117:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((symptr = af_malloc (key->af_ldes, (unsigned) (strlen (symbol) + sizeof (char)))) == NULL)
data/shapetools-1.4pl6/src/atfs/afudattrs.c:181:122:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((VATTR(key).af_uhtab[symindex].symbol = af_realloc (key->af_ldes, VATTR(key).af_uhtab[symindex].symbol, (unsigned) (strlen (symbol) + sizeof (char)))) == NULL)
data/shapetools-1.4pl6/src/atfs/afudattrs.c:191:80:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if ((entry->symbol = af_realloc (key->af_ldes, entry->symbol, (unsigned) (strlen (symbol) + sizeof (char)))) == NULL)
data/shapetools-1.4pl6/src/atfs/afudattrs.c:205:98:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((VATTR(key).af_udalist[i] = af_realloc (key->af_ldes, VATTR(key).af_udalist[i], (unsigned) (strlen (symbol) + sizeof (char)))) == NULL)
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:96:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sptr = &line[strlen(line)]+1; /* move to next entry */
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:112:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  archname[strlen (archname)-1] = AF_OLD_ARCHEXT;
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:115:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (newarname, "/");
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:118:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strcpy (name, archname + strlen (AF_OLD_ATFSFILEID));
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:119:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      name[strlen(name)-1] = '\0';
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:134:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (name, ".");
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:160:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return !strncmp (expAnswer, answer, strlen (expAnswer));
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:195:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  while (itemCmp (&(input->string[input->curPos]), searchStr, strlen (searchStr))) {
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:877:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	(strlen (udaList[curUda].uda[i]) + sizeof (char));
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1347:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  oldDatFullName[strlen(oldDatFullName)-1] = AF_OLD_DATAEXT;
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1528:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen (dirEntry->d_name);
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1565:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strcpy (fileName, dirEntry->d_name + strlen (AF_OLD_ATFSFILEID));
data/shapetools-1.4pl6/src/atfs/atfsrepair.c:1566:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen (fileName) - 1;
data/shapetools-1.4pl6/src/atfs/config.c:127:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *newStr = malloc (strlen(str)+1);
data/shapetools-1.4pl6/src/atfs/config.h:309:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int	read		A((int filedes, void *buf, unsigned int nbyte));
data/shapetools-1.4pl6/src/atfs/config.h:312:8:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
mode_t	umask		A((mode_t cmask));
data/shapetools-1.4pl6/src/atfs/config.h:323:5:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int	fgetc		A((FILE *stream));
data/shapetools-1.4pl6/src/atfstk/attrs.c:238:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (resultTime, &asoTimeString[4], 12);
data/shapetools-1.4pl6/src/atfstk/attrs.c:241:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (resultTime, &asoTimeString[4], 7);
data/shapetools-1.4pl6/src/atfstk/attrs.c:242:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (&resultTime[7], &asoTimeString[19], 5);
data/shapetools-1.4pl6/src/atfstk/bind.c:113:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy (resultStr, startPtr, cacheKeyLen);
data/shapetools-1.4pl6/src/atfstk/bind.c:147:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((resultStr = malloc (strlen (binding)+1)) == NULL) {
data/shapetools-1.4pl6/src/atfstk/bind.c:364:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len += strlen (stMessage);
data/shapetools-1.4pl6/src/atfstk/bind.c:369:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len += strlen (stMessage);
data/shapetools-1.4pl6/src/atfstk/bind.c:401:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (bindTargName, ".");
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:64:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	 malloc ((size_t) strlen (AT_ATTALIAS) + strlen(attrValue) + 2)) == NULL) {
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:64:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	 malloc ((size_t) strlen (AT_ATTALIAS) + strlen(attrValue) + 2)) == NULL) {
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:71:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (reqAttrs.af_udattrs[0], "=");
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:90:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	 malloc ((size_t) strlen (AT_ATTCACHEKEY) + strlen(attrValue) + 2)) == NULL) {
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:90:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	 malloc ((size_t) strlen (AT_ATTCACHEKEY) + strlen(attrValue) + 2)) == NULL) {
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:97:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (reqAttrs.af_udattrs[0], "=");
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:223:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	 malloc ((size_t) strlen (AT_ATTALIAS) + strlen(alias) + 2)) == NULL) {
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:223:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	 malloc ((size_t) strlen (AT_ATTALIAS) + strlen(alias) + 2)) == NULL) {
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:230:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (reqAttrs.af_udattrs[0], "=");
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:237:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	 malloc ((size_t) strlen(attrName) + strlen(attrValue ? attrValue : "") + 2)) == NULL) {
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:237:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	 malloc ((size_t) strlen(attrName) + strlen(attrValue ? attrValue : "") + 2)) == NULL) {
data/shapetools-1.4pl6/src/atfstk/bind_attr.c:244:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (reqAttrs.af_udattrs[0], "=");
data/shapetools-1.4pl6/src/atfstk/bind_options.c:109:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  argLen = strlen(arg);
data/shapetools-1.4pl6/src/atfstk/bind_options.c:200:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((pathLen = strlen (path)) > 0)
data/shapetools-1.4pl6/src/atfstk/bind_options.c:224:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if ((newArgv[newArgc] = malloc (strlen (newArg)+pathLen+1)) == NULL) {
data/shapetools-1.4pl6/src/atfstk/bind_options.c:232:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat (newArgv[newArgc], "/");
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:65:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (ruleFileName, "/");
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:148:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((bindRules[ruleCount].name = malloc ((size_t) strlen (name)+1)) == NULL) {
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:157:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((bindRules[ruleCount].body = malloc ((size_t) strlen (body)+1)) == NULL) {
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:164:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((sourceBuf = malloc ((size_t) strlen (source)+1)) == NULL) {
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:381:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((fileNameBuf = malloc ((size_t) strlen (fileName)+1)) == NULL) {
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:431:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t newSize = 0, maxSize = strlen(str)+256;
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:463:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int targNameLen = strlen(curEval->targName);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:466:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy (newPtr, curEval->targName, targNameLen);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:475:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      numLen = strlen (numBuf);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:477:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy (newPtr, numBuf, numLen);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:492:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      attrLen = strlen (numBuf);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:494:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy (newPtr, numBuf, attrLen);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:501:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      attrLen = strlen (bindRules[curEval->ruleTabIdx].name);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:503:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy (newPtr, bindRules[curEval->ruleTabIdx].name, attrLen);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:510:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      attrLen = strlen (curEval->targName);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:512:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy (newPtr, curEval->targName, attrLen);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:541:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      attrLen = strlen (attrBuf);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:543:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy (newPtr, attrBuf, attrLen);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:547:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      attrLen = strlen (attrNameBuf);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:549:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy (newPtr, "$_", 2);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:551:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy (newPtr, attrNameBuf, attrLen);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:609:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    resultLen = strlen (resultBuf);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:611:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (newPtr, resultBuf, resultLen);
data/shapetools-1.4pl6/src/atfstk/bind_rules.c:671:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((myRuleName = malloc ((size_t) strlen (ruleName)+1)) == NULL) {
data/shapetools-1.4pl6/src/atfstk/bind_scan.c:876:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    endPtr = &(rule->name[strlen(rule->name)-1]);
data/shapetools-1.4pl6/src/atfstk/citeattr.c:95:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      stringEnd = strlen ((char *)dest);
data/shapetools-1.4pl6/src/atfstk/citeattr.c:96:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat ((char *)dest, startPtr, curPtr - startPtr);
data/shapetools-1.4pl6/src/atfstk/citeattr.c:105:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      outSize += strlen(attrName)+3;
data/shapetools-1.4pl6/src/atfstk/citeattr.c:117:20:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	if (appendDollar) strcat ((char *)dest, "$");
data/shapetools-1.4pl6/src/atfstk/citeattr.c:121:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if ((outSize += strlen(attrValue)) >= destSize)
data/shapetools-1.4pl6/src/atfstk/citeattr.c:136:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    stringEnd = strlen ((char *)dest);
data/shapetools-1.4pl6/src/atfstk/citeattr.c:137:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
    strncat ((char *)dest, startPtr, &buf[bufSize] - startPtr);
data/shapetools-1.4pl6/src/atfstk/lock.c:78:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((completeAttr = malloc ((unsigned)(strlen (attrName) + strlen (prologue) + strlen (attrText) + 2))) == NULL) {
data/shapetools-1.4pl6/src/atfstk/lock.c:78:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((completeAttr = malloc ((unsigned)(strlen (attrName) + strlen (prologue) + strlen (attrText) + 2))) == NULL) {
data/shapetools-1.4pl6/src/atfstk/lock.c:78:82:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((completeAttr = malloc ((unsigned)(strlen (attrName) + strlen (prologue) + strlen (attrText) + 2))) == NULL) {
data/shapetools-1.4pl6/src/atfstk/lock.c:206:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fwrite (prologue, sizeof (char), (size_t)strlen (prologue), tmpFile);
data/shapetools-1.4pl6/src/atfstk/lock.c:208:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fwrite (oldText, sizeof (char), (size_t)strlen (oldText), tmpFile);
data/shapetools-1.4pl6/src/atfstk/network.c:66:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat (tmpPath, "/");
data/shapetools-1.4pl6/src/atfstk/network.c:70:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat (tmpPath, ".");
data/shapetools-1.4pl6/src/atfstk/network.c:89:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    curNameLen = strlen (mountEntry->at_mnt_dir);
data/shapetools-1.4pl6/src/atfstk/network.c:108:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (networkPath, ":");
data/shapetools-1.4pl6/src/atfstk/network.c:112:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (networkPath, "/");
data/shapetools-1.4pl6/src/atfstk/network.c:119:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (networkPath, "~");
data/shapetools-1.4pl6/src/atfstk/network.c:123:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (networkPath, "@");
data/shapetools-1.4pl6/src/atfstk/network.c:150:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      curNameLen = strlen (mountEntry->at_mnt_fsname);
data/shapetools-1.4pl6/src/atfstk/read.c:155:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    nread = read(dp->ar_fd, dp->ar_pos, buffer_size - nbytes) ;
data/shapetools-1.4pl6/src/atfstk/read.c:184:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    nread = read(dp->ar_fd,
data/shapetools-1.4pl6/src/atfstk/read.c:455:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return read(0, bufp, size) ;
data/shapetools-1.4pl6/src/atfstk/uda.c:115:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      logPtr += strlen (logPtr);
data/shapetools-1.4pl6/src/atfstk/uda.c:117:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      logPtr += strlen (logPtr);
data/shapetools-1.4pl6/src/atfstk/uda.c:119:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      logPtr += strlen (logPtr);
data/shapetools-1.4pl6/src/atfstk/uda.c:125:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      logPtr += strlen (logPtr);
data/shapetools-1.4pl6/src/atfstk/uda.c:128:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      logPtr += strlen (logPtr);
data/shapetools-1.4pl6/src/atfstk/uda.c:132:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      logPtr += strlen (logPtr);
data/shapetools-1.4pl6/src/atfstk/uda.c:135:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      logPtr += strlen (logPtr);
data/shapetools-1.4pl6/src/atfstk/uda.c:138:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      logPtr += strlen (logPtr);
data/shapetools-1.4pl6/src/atfstk/uda.c:153:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      logPtr += strlen (logPtr);
data/shapetools-1.4pl6/src/atfstk/uda.c:172:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      logPtr += strlen (logPtr);
data/shapetools-1.4pl6/src/atfstk/uda.c:247:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (headerStr, " ");
data/shapetools-1.4pl6/src/atfstk/uda.c:252:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (headerStr, " ");
data/shapetools-1.4pl6/src/atfstk/uda.c:254:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (headerStr, " ");
data/shapetools-1.4pl6/src/atfstk/uda.c:376:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (tmpAttr, "=");
data/shapetools-1.4pl6/src/atfstk/uda.c:478:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((attrSize = atExpandAttrs (aso, attrValue, strlen(attrValue), attrMem,
data/shapetools-1.4pl6/src/atfstk/uda.c:621:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((attrValue = malloc (strlen (attrMem+1))) == NULL) {
data/shapetools-1.4pl6/src/atfstk/uda.c:655:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    attrNameLen = strlen (attr);
data/shapetools-1.4pl6/src/atfstk/uda.c:658:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen (attr) > AF_UDANAMLEN) {
data/shapetools-1.4pl6/src/atfstk/uda.c:684:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    attrMemLen = strlen (attr);
data/shapetools-1.4pl6/src/atfstk/uda.c:741:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (attrFileName, valPtr+1, PATH_MAX-1);
data/shapetools-1.4pl6/src/atfstk/uda.c:756:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    attrMemLen = strlen (attrName) + attrIbuf.st_size + 2;
data/shapetools-1.4pl6/src/atfstk/uda.c:762:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fread (&attrMem[strlen(attrName)+1], sizeof (char), (size_t)attrIbuf.st_size, attrFile); 
data/shapetools-1.4pl6/src/atfstk/uda.c:776:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    memPtr = &attrMem[strlen(attrName)+1];
data/shapetools-1.4pl6/src/atfstk/uda.c:777:68:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    charNum = fread (memPtr, sizeof (char), (size_t)(attrMemLen-2)-strlen(attrName), stdin);
data/shapetools-1.4pl6/src/atfstk/uda.c:781:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((retCode = setStdAttr (aso, mode, attrName, &attrMem[strlen(attrName)+1])) == 0) {
data/shapetools-1.4pl6/src/atfstk/user.c:59:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (resultUser->af_username, fullName, USER_MAX);
data/shapetools-1.4pl6/src/atfstk/user.c:65:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (resultUser->af_username, fullName, USER_MAX);
data/shapetools-1.4pl6/src/atfstk/user.c:69:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (resultUser->af_userdomain, hostPtr, DOMAIN_MAX);
data/shapetools-1.4pl6/src/atfstk/user.c:75:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (resultUser->af_userhost, hostPtr, HOST_MAX);
data/shapetools-1.4pl6/src/atfstk/user.c:83:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (resultUser->af_userhost, hostPtr, HOST_MAX);
data/shapetools-1.4pl6/src/atfstk/user.c:84:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (resultUser->af_userdomain, domainPtr, DOMAIN_MAX);
data/shapetools-1.4pl6/src/atfstk/user.c:90:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  (void) strncpy (resultUser->af_userdomain, hostPtr, DOMAIN_MAX);
data/shapetools-1.4pl6/src/shape/dkey.c:40:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (buffer, "[");
data/shapetools-1.4pl6/src/shape/dkey.c:43:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (buffer, "#");
data/shapetools-1.4pl6/src/shape/dkey.c:54:14:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      (void) strcat (buffer, "*");
data/shapetools-1.4pl6/src/shape/dkey.c:58:14:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      (void) strcat (buffer, "*");
data/shapetools-1.4pl6/src/shape/dkey.c:60:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (buffer, "]");
data/shapetools-1.4pl6/src/shape/dkey.c:77:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    curlen += strlen (s);
data/shapetools-1.4pl6/src/shape/dkey.c:201:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((len += strlen (KVERS)) < AT_MAXATTRSIZE)
data/shapetools-1.4pl6/src/shape/dkey.c:209:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (q->keybuffer, ";");
data/shapetools-1.4pl6/src/shape/dkey.c:231:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (q->keybuffer, "{");
data/shapetools-1.4pl6/src/shape/dkey.c:261:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((buf_end += strlen (dis) + 1) >= buf_bound)
data/shapetools-1.4pl6/src/shape/dkey.c:268:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat (q->keybuffer, "}");
data/shapetools-1.4pl6/src/shape/dkey.c:282:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((buf_end += strlen (edit_buffer) +5) >= buf_bound)
data/shapetools-1.4pl6/src/shape/files.c:70:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (pathlist[lastpath][1], "/");
data/shapetools-1.4pl6/src/shape/files.c:90:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	  strcat (actpath, "/");
data/shapetools-1.4pl6/src/shape/files.c:183:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if((currentItem->unixName = malloc((unsigned) (strlen(unixName) + sizeof(char)))) == NIL)
data/shapetools-1.4pl6/src/shape/files.c:286:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((confid_list->string = malloc ((unsigned)(strlen (name)+
data/shapetools-1.4pl6/src/shape/files.c:309:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	malloc ((unsigned) (strlen (name) + sizeof(char)))) == NIL)
data/shapetools-1.4pl6/src/shape/files.c:609:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat (buf.af_syspath, "/");
data/shapetools-1.4pl6/src/shape/files.c:697:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    atBindRule = malloc (strlen (bind_rule ? bind_rule : "")+2);
data/shapetools-1.4pl6/src/shape/files.c:703:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (atBindRule, ":");
data/shapetools-1.4pl6/src/shape/files.c:931:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sbcat (restored_objs_macro, currentItem->unixName, strlen (currentItem->unixName));
data/shapetools-1.4pl6/src/shape/files.c:974:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strcpy (roid, af_retattr (rkey, AF_ATTSPATH) + strlen (curvpath[0]) + 1);
data/shapetools-1.4pl6/src/shape/files.c:975:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat (roid, "/");
data/shapetools-1.4pl6/src/shape/files.c:980:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat (roid, "/");
data/shapetools-1.4pl6/src/shape/hash.c:155:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				      strlen(value) + sizeof(char));
data/shapetools-1.4pl6/src/shape/hash.c:157:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      current->entry = check_malloc (strlen(value) + sizeof(char));
data/shapetools-1.4pl6/src/shape/hash.c:169:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				    strlen(value) + sizeof(char));
data/shapetools-1.4pl6/src/shape/hash.c:171:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    current->entry = check_malloc (strlen(value) + sizeof(char));
data/shapetools-1.4pl6/src/shape/hash.c:213:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				     strlen (lastentry) + 
data/shapetools-1.4pl6/src/shape/hash.c:214:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				     strlen (lp->string) +
data/shapetools-1.4pl6/src/shape/inherit.c:58:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(fullname,"/");
data/shapetools-1.4pl6/src/shape/inherit.c:68:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(fullname,".");
data/shapetools-1.4pl6/src/shape/inherit.c:159:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  attrlen = strlen (attr);
data/shapetools-1.4pl6/src/shape/inherit.c:165:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      end = start + strlen (start);
data/shapetools-1.4pl6/src/shape/inherit.c:235:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if((derivation_key = malloc((unsigned) (strlen(do_key) +
data/shapetools-1.4pl6/src/shape/inherit.c:236:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					  strlen (ATTRNAME) + 2))) == NIL)
data/shapetools-1.4pl6/src/shape/inherit.c:239:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (derivation_key, "=");
data/shapetools-1.4pl6/src/shape/inherit.c:255:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int pathlen = strlen (af_afpath (this_rule->name));
data/shapetools-1.4pl6/src/shape/inherit.c:259:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	targetpath = check_malloc (pathlen + strlen (name) + 2);
data/shapetools-1.4pl6/src/shape/macro.c:60:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	  strcat(retval, " ");
data/shapetools-1.4pl6/src/shape/macro.c:72:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	  strcat(retval, " ");
data/shapetools-1.4pl6/src/shape/macro.c:112:6:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	    strcat(retval," ");
data/shapetools-1.4pl6/src/shape/macro.c:135:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result_str = check_realloc (result_str, (unsigned)(strlen (string)+1));
data/shapetools-1.4pl6/src/shape/macro.c:137:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result_str = check_malloc ((unsigned)(strlen (string)+1));
data/shapetools-1.4pl6/src/shape/macro.c:183:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  y = check_realloc (y, strlen (x) + 1);
data/shapetools-1.4pl6/src/shape/macro.c:229:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if ((curvpath[i] = malloc((unsigned) (strlen(string) + strlen(curvpath[0])
data/shapetools-1.4pl6/src/shape/macro.c:229:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if ((curvpath[i] = malloc((unsigned) (strlen(string) + strlen(curvpath[0])
data/shapetools-1.4pl6/src/shape/macro.c:233:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	  strcat(curvpath[i],"/");
data/shapetools-1.4pl6/src/shape/macro.c:249:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if ((curvpath[i] = malloc((unsigned) (strlen(string) + sizeof(char)))) == NIL)
data/shapetools-1.4pl6/src/shape/macro.c:260:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if((curvpath[i] = malloc((unsigned) (strlen(string) + strlen(curvpath[0])
data/shapetools-1.4pl6/src/shape/macro.c:260:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if((curvpath[i] = malloc((unsigned) (strlen(string) + strlen(curvpath[0])
data/shapetools-1.4pl6/src/shape/macro.c:264:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	  strcat(curvpath[i],"/");
data/shapetools-1.4pl6/src/shape/macro.c:281:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if((curvpath[i] = malloc((unsigned) (strlen(string) + sizeof(char)))) == NIL)
data/shapetools-1.4pl6/src/shape/macro.c:307:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  olen = strlen (original);
data/shapetools-1.4pl6/src/shape/macro.c:338:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	 subject_len = strlen (subject);
data/shapetools-1.4pl6/src/shape/macro.c:340:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       old_len = old ? strlen (old) : 0;
data/shapetools-1.4pl6/src/shape/macro.c:341:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       new_len = new ? strlen (new) : 0;
data/shapetools-1.4pl6/src/shape/macro.c:397:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	   strncat (tluser, oldp, p - oldp);
data/shapetools-1.4pl6/src/shape/macro.c:437:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	 strncpy (str1, subject, p-subject);
data/shapetools-1.4pl6/src/shape/macro.c:467:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int macl = imp_macro ? strlen (imp_macro) : 0;
data/shapetools-1.4pl6/src/shape/macro.c:477:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (testmac, ")");
data/shapetools-1.4pl6/src/shape/macro.c:561:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (sbcpy(cmd_buf, inpstring, strlen(inpstring)) == 0)
data/shapetools-1.4pl6/src/shape/macro.c:578:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int	len	= strlen(base);
data/shapetools-1.4pl6/src/shape/macro.c:596:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (sbcat(cmd_buf, expcomm, strlen(expcomm)) == 0)
data/shapetools-1.4pl6/src/shape/macro.c:602:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (sbcat(cmd_buf, base, strlen(base)) == 0)
data/shapetools-1.4pl6/src/shape/macro.c:710:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			       strlen (cooked_string)) == 0)
data/shapetools-1.4pl6/src/shape/macro.c:716:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			       strlen (mist)) == 0)
data/shapetools-1.4pl6/src/shape/macro.c:735:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				      strlen (cooked_string)) == 0)
data/shapetools-1.4pl6/src/shape/macro.c:741:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(expandedValue)) == 0)
data/shapetools-1.4pl6/src/shape/macro.c:762:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (sbcat(mac_buf, base, strlen(base)) == 0)
data/shapetools-1.4pl6/src/shape/macro.c:789:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(&macr[0],")");
data/shapetools-1.4pl6/src/shape/main.c:226:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if ((cmdtargets[k] = malloc((unsigned) (strlen(newav[i]) + sizeof(char)))) == NIL)
data/shapetools-1.4pl6/src/shape/main.c:299:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      char *msg = malloc (strlen (cmd_line_vars[i]) +
data/shapetools-1.4pl6/src/shape/main.c:300:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			  strlen (" is not a variant name") + sizeof (char));
data/shapetools-1.4pl6/src/shape/mfiles.c:134:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ((read_ret = read(handle, mf->mf_buffer + total,
data/shapetools-1.4pl6/src/shape/mfiles.c:235:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ((read_ret = read(fd, next_here, left)) == -1) {
data/shapetools-1.4pl6/src/shape/mfiles.c:293:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (bufptr + strlen(bufptr) != mf->mf_end) {
data/shapetools-1.4pl6/src/shape/parser.c:280:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(incpath, "/") ;
data/shapetools-1.4pl6/src/shape/parser.c:386:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while (strlen(*linep)) {	/* something is left */
data/shapetools-1.4pl6/src/shape/parser.c:733:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(line + 4, section, strlen(section))) {
data/shapetools-1.4pl6/src/shape/produce.c:160:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy (curvar[vcuri-vardepi], "");
data/shapetools-1.4pl6/src/shape/produce.c:198:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  j = j + strlen(cur->name);
data/shapetools-1.4pl6/src/shape/produce.c:215:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  j = j + strlen(hhh);
data/shapetools-1.4pl6/src/shape/produce.c:246:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		      strcat (comm, " ");
data/shapetools-1.4pl6/src/shape/produce.c:248:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    j = j + (roid ? (strlen (roid) + ((k > 1) ? 1 : 0)) : 0);
data/shapetools-1.4pl6/src/shape/produce.c:275:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		      j = j + strlen (curdep);
data/shapetools-1.4pl6/src/shape/produce.c:283:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		      strcat(comm," ");
data/shapetools-1.4pl6/src/shape/produce.c:304:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		      j = j + strlen(curdep);
data/shapetools-1.4pl6/src/shape/produce.c:321:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		     malloc((unsigned) (strlen(cur->name) + 1))) == NIL)
data/shapetools-1.4pl6/src/shape/produce.c:329:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		j = j + strlen(common_prefix);
data/shapetools-1.4pl6/src/shape/produce.c:339:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		j += st ? strlen(st) : 0;
data/shapetools-1.4pl6/src/shape/produce.c:360:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  j += st ? strlen(st) : 0;
data/shapetools-1.4pl6/src/shape/produce.c:630:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((retrv_attr = malloc ((unsigned)(strlen (do_key) +
data/shapetools-1.4pl6/src/shape/produce.c:631:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				       strlen (ATTRNAME) + 2))) == NIL)
data/shapetools-1.4pl6/src/shape/produce.c:635:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (retrv_attr, "=");
data/shapetools-1.4pl6/src/shape/rule.c:146:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  replace_length = strlen (tokbuf);
data/shapetools-1.4pl6/src/shape/rule.c:147:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  trailer_length = strlen (position + replace_length);
data/shapetools-1.4pl6/src/shape/rule.c:148:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  replacement_length = strlen (insertion);
data/shapetools-1.4pl6/src/shape/rule.c:151:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (new_base, base, replacement_offset);
data/shapetools-1.4pl6/src/shape/rule.c:280:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    (unsigned)(strlen(newcomm)
data/shapetools-1.4pl6/src/shape/rule.c:298:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((depfield[1] = malloc((unsigned) (strlen(targfield[i]) + 3))) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:300:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(depfield[1],"%");
data/shapetools-1.4pl6/src/shape/rule.c:302:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if((targfield[1] = malloc((unsigned) (strlen(p) + 3))) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:328:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(string2,string,i + 1);
data/shapetools-1.4pl6/src/shape/rule.c:343:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((targfield[targnr] = malloc((unsigned) strlen(t) + 1)) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:382:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((depfield[depnr] = malloc((unsigned) strlen(t) + 1)) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:427:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if ((heritfield[heritnr] = malloc((unsigned) strlen(t) + 1)) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:447:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((cmdfield[cmdnr] = malloc((unsigned) strlen(t) + 1)) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:449:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (t[strlen(t)-1] == '\n')
data/shapetools-1.4pl6/src/shape/rule.c:450:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      t[strlen(t)-1] = '\0';
data/shapetools-1.4pl6/src/shape/rule.c:462:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((cmdfield[cmdnr] = malloc ((unsigned) strlen(string) + 1)) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:464:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (string[strlen(string)-1] == '\n')
data/shapetools-1.4pl6/src/shape/rule.c:465:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    string[strlen(string)-1] = '\0';
data/shapetools-1.4pl6/src/shape/rule.c:594:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 realloc(current->deplist, (unsigned) (strlen(depfield[kkk]) + strlen(current->deplist) + 3))) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:594:68:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 realloc(current->deplist, (unsigned) (strlen(depfield[kkk]) + strlen(current->deplist) + 3))) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:596:8:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
			    strcat(current->deplist," ");
data/shapetools-1.4pl6/src/shape/rule.c:626:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if((current->name = malloc( (unsigned) strlen( targfield[i] ) + 1)) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:663:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if ((current->firstdep = malloc((unsigned) (strlen(depfield[1]) + sizeof(char)))) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:688:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		      malloc( (unsigned) (strlen (depfield[j-xx]) + 1))) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:697:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			       (strlen(current->deplist) + (strlen(depfield[j-xx]))) + 3)) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:697:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			       (strlen(current->deplist) + (strlen(depfield[j-xx]))) + 3)) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:699:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		  strcat(current->deplist," ");
data/shapetools-1.4pl6/src/shape/rule.c:725:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			  malloc( (unsigned) (strlen(srcname) + 1))) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:733:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				  (unsigned) (strlen(srcname) + strlen(current->deplist) + 3))) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:733:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				  (unsigned) (strlen(srcname) + strlen(current->deplist) + 3))) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:735:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		      strcat(current->deplist," ");
data/shapetools-1.4pl6/src/shape/rule.c:751:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  malloc((unsigned) (strlen(heritfield[j]) + sizeof(char)))) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:763:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  malloc((unsigned) (strlen(targfield[j]) + 1))) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:776:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      if((curcmd->command = malloc( (unsigned) strlen (cmdfield[j]) + 1)) == NIL)
data/shapetools-1.4pl6/src/shape/rule.c:985:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  (void) strncpy (result_str, c1, c2-c1);
data/shapetools-1.4pl6/src/shape/rule.c:991:12:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
    (void) strncat (result_str, c1, c2-c1);
data/shapetools-1.4pl6/src/shape/rule.c:1028:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  (void) strncpy (result_str, c1, c2-c1);
data/shapetools-1.4pl6/src/shape/rule.c:1034:12:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
    (void) strncat (result_str, c1, c2-c1);
data/shapetools-1.4pl6/src/shape/rule.c:1390:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (default_dependency_line, " ");
data/shapetools-1.4pl6/src/shape/rule.c:1482:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  q1 = pattern + ((l = strlen (pattern)) ? l-1 : 0);
data/shapetools-1.4pl6/src/shape/rule.c:1483:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  q2 = string + ((l = strlen (string)) ? l-1 : 0);
data/shapetools-1.4pl6/src/shape/rule.c:1487:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (wild_stem, p2, q2 - p2);
data/shapetools-1.4pl6/src/shape/rule.c:1630:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cleaned_pattern = check_malloc (strlen (rpat) + 3);
data/shapetools-1.4pl6/src/shape/rule.c:1634:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	(void) strcat (cleaned_pattern, "$");
data/shapetools-1.4pl6/src/shape/shapeopt.c:64:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, "-");
data/shapetools-1.4pl6/src/shape/shapeopt.c:66:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, " ");
data/shapetools-1.4pl6/src/shape/shapeopt.c:76:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, "-");
data/shapetools-1.4pl6/src/shape/shapeopt.c:78:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, " ");
data/shapetools-1.4pl6/src/shape/shapeopt.c:89:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, "-");
data/shapetools-1.4pl6/src/shape/shapeopt.c:91:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, " ");
data/shapetools-1.4pl6/src/shape/shapeopt.c:113:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((shapefiles->string = malloc((unsigned) strlen(arg) + sizeof(char))) == NIL)
data/shapetools-1.4pl6/src/shape/shapeopt.c:127:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((shfiles->string = malloc((unsigned) strlen(arg) + sizeof(char))) == NIL)
data/shapetools-1.4pl6/src/shape/shapeopt.c:150:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((forcelist[i] = malloc((unsigned) (strlen(arg) + sizeof(char)))) == NIL)
data/shapetools-1.4pl6/src/shape/shapeopt.c:153:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, "-");
data/shapetools-1.4pl6/src/shape/shapeopt.c:155:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, " ");
data/shapetools-1.4pl6/src/shape/shapeopt.c:157:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, " ");
data/shapetools-1.4pl6/src/shape/shapeopt.c:184:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, "-");
data/shapetools-1.4pl6/src/shape/shapeopt.c:186:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, " ");
data/shapetools-1.4pl6/src/shape/shapeopt.c:196:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, "-");
data/shapetools-1.4pl6/src/shape/shapeopt.c:198:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, " ");
data/shapetools-1.4pl6/src/shape/shapeopt.c:208:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, "-");
data/shapetools-1.4pl6/src/shape/shapeopt.c:210:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, " ");
data/shapetools-1.4pl6/src/shape/shapeopt.c:221:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, "-");
data/shapetools-1.4pl6/src/shape/shapeopt.c:223:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, " ");
data/shapetools-1.4pl6/src/shape/shapeopt.c:233:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, "-");
data/shapetools-1.4pl6/src/shape/shapeopt.c:235:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, " ");
data/shapetools-1.4pl6/src/shape/shapeopt.c:245:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, "-");
data/shapetools-1.4pl6/src/shape/shapeopt.c:247:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, " ");
data/shapetools-1.4pl6/src/shape/shapeopt.c:257:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, "-");
data/shapetools-1.4pl6/src/shape/shapeopt.c:259:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, " ");
data/shapetools-1.4pl6/src/shape/shapeopt.c:271:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, "-");
data/shapetools-1.4pl6/src/shape/shapeopt.c:273:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, " ");
data/shapetools-1.4pl6/src/shape/shapeopt.c:275:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, " ");
data/shapetools-1.4pl6/src/shape/shapeopt.c:286:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, "-");
data/shapetools-1.4pl6/src/shape/shapeopt.c:288:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, " ");
data/shapetools-1.4pl6/src/shape/shapeopt.c:311:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, "-");
data/shapetools-1.4pl6/src/shape/shapeopt.c:313:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, " ");
data/shapetools-1.4pl6/src/shape/shapeopt.c:325:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, "-");
data/shapetools-1.4pl6/src/shape/shapeopt.c:327:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, " ");
data/shapetools-1.4pl6/src/shape/shapeopt.c:363:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((vnp = (char *)malloc (strlen (arg) + (addplus ? 2 : 1))) == NULL)
data/shapetools-1.4pl6/src/shape/shapeopt.c:366:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy (vnp, "+");
data/shapetools-1.4pl6/src/shape/shapeopt.c:373:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, "-");
data/shapetools-1.4pl6/src/shape/shapeopt.c:375:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, " ");
data/shapetools-1.4pl6/src/shape/shapeopt.c:377:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (shapeflags, " ");
data/shapetools-1.4pl6/src/shape/strbuf.c:113:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(sb->buf, string, len);
data/shapetools-1.4pl6/src/shape/strbuf.c:183:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(sb->buf+sb->len, string, len);
data/shapetools-1.4pl6/src/shape/utils.c:76:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *tmp = check_malloc(strlen(s) + 1) ;
data/shapetools-1.4pl6/src/shape/utils.c:102:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(s1, s2, n) ;
data/shapetools-1.4pl6/src/shape/utils.c:110:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((sb = sbcat(sb, string, strlen(string))) == NULL) {
data/shapetools-1.4pl6/src/shape/varsec.c:171:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       malloc ((unsigned) (strlen (lvarname) + sizeof (char)))) == NIL)
data/shapetools-1.4pl6/src/shape/varsec.c:256:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    varbuf = sbcat (varbuf, curvar[i], strlen (curvar[i]));
data/shapetools-1.4pl6/src/shape/varsec.c:386:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    malloc((unsigned) (strlen(prev_dir) + sizeof(char)))) == NIL)
data/shapetools-1.4pl6/src/shape/varsec.c:392:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     malloc((unsigned) (strlen(pathlist) + sizeof(char)))) == NIL)
data/shapetools-1.4pl6/src/shape/varsec.c:402:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  malloc((unsigned) (strlen(prev_dir) + sizeof(char)))) == NIL)
data/shapetools-1.4pl6/src/shape/varsec.c:408:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   malloc((unsigned) (strlen(pathlist) + sizeof(char)))) == NIL)
data/shapetools-1.4pl6/src/sttk/call.c:113:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = strlen (contents);
data/shapetools-1.4pl6/src/sttk/call.c:238:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((cmdproc2 = malloc(strlen(command_processor) + 1)) == NULL) {
data/shapetools-1.4pl6/src/sttk/call.c:255:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((cmdproc2 = malloc(strlen(command_processor) + 1)) == NULL) {
data/shapetools-1.4pl6/src/sttk/call.c:382:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cmd_write = strlen(command) ;
data/shapetools-1.4pl6/src/sttk/kbdio.c:108:17:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((c = fgetc (stdin)) != EOF) {
data/shapetools-1.4pl6/src/sttk/kbdio.c:149:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    tmp = realloc(text, strlen(text) + 1) ;
data/shapetools-1.4pl6/src/sttk/kbdio.c:207:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return (!strncmp (defaultAnswer, answer, minimum(strlen(defaultAnswer), strlen(answer))));
data/shapetools-1.4pl6/src/sttk/kbdio.c:207:75:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return (!strncmp (defaultAnswer, answer, minimum(strlen(defaultAnswer), strlen(answer))));
data/shapetools-1.4pl6/src/sttk/mktime.c:127:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!strncmp (mon_tab[i], monthStr, strlen (mon_tab[i])))
data/shapetools-1.4pl6/src/sttk/mktime.c:289:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  timeBuf[strlen(timeBuf)-1] = '\0';
data/shapetools-1.4pl6/src/sttk/parseargs.c:42:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!strncmp(odesc[i].OptName, str, strlen(odesc[i].OptName)))
data/shapetools-1.4pl6/src/sttk/parseargs.c:59:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return (strlen(right->OptName) - strlen(left->OptName));
data/shapetools-1.4pl6/src/sttk/parseargs.c:59:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return (strlen(right->OptName) - strlen(left->OptName));
data/shapetools-1.4pl6/src/sttk/parseargs.c:95:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    c_printed += strlen(progname) + 2;
data/shapetools-1.4pl6/src/sttk/parseargs.c:109:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      length = strlen(odesc[i].OptName); length++;
data/shapetools-1.4pl6/src/sttk/parseargs.c:124:3:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
  sprintf (stMessage, "]"); c_printed++;
data/shapetools-1.4pl6/src/sttk/parseargs.c:131:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = strlen(odesc[i].OptName);
data/shapetools-1.4pl6/src/sttk/parseargs.c:169:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((extra_text) && ((strlen(extra_text) + c_printed + 1) > twidth)) {
data/shapetools-1.4pl6/src/sttk/parseargs.c:236:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tkn = SkipThisToken(tkn, strlen (odesc[opt].OptName));
data/shapetools-1.4pl6/src/sttk/strtab.c:102:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  symLen = strlen (symbol) + sizeof (char);
data/shapetools-1.4pl6/src/sttk/ststring.c:95:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	 subject_len = strlen (subject);
data/shapetools-1.4pl6/src/sttk/ststring.c:97:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       old_len = oldStr ? strlen (oldStr) : 0;
data/shapetools-1.4pl6/src/sttk/ststring.c:98:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       new_len = newStr ? strlen (newStr) : 0;
data/shapetools-1.4pl6/src/sttk/ststring.c:157:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int strsiz = strlen (str);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:173:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i = strlen(str);
data/shapetools-1.4pl6/src/vc/atfsit/atfsit.c:380:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(msg);
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:78:10:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while (fgetc(rlog_pipe) != '\n') ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:93:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if (!strncmp(input_line, K_rcsfile, strlen(K_rcsfile))) {
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:95:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    check_strdup(input_line + strlen(K_rcsfile) + 1) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:96:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    } else if (!strncmp(input_line, K_wrkfile, strlen(K_wrkfile))) {
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:97:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		char *wfile = check_strdup(input_line + strlen(K_wrkfile) + 1);
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:104:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    } else if (!strncmp(input_line, K_comlead, strlen(K_comlead))) {
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:105:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		char *tmp = check_strdup(input_line + strlen(K_comlead) + 1) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:114:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if (!strncmp(input_line, K_descr, strlen(K_descr))) {
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:117:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    } else if (!strncmp(input_line, K_locks, strlen(K_locks))) {
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:120:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    } else if (!strncmp(input_line, K_alist, strlen(K_alist))) {
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:123:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    } else if (!strncmp(input_line, K_symnames, strlen(K_symnames))) {
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:201:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    check_calloc(strlen(input_line) + 2, 1) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:206:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				  strlen(rcsfile->description) +
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:207:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				  strlen(input_line) + 2) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:212:6:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	    strcat(rcsfile->description, "\n") ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:223:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if (strncmp(input_line, K_revision, strlen(K_revision))) {
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:235:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    scan = input_line + strlen(K_revision) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:254:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if (strncmp(input_line, K_date, strlen(K_date))) {
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:264:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    scan2 = input_line + strlen(K_date) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:272:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if (strncmp(scan, K_author, strlen(K_author))) {
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:281:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    scan += strlen(K_author) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:289:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if (strncmp(scan, K_state, strlen(K_state))) {
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:298:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    scan +=strlen(K_state) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:327:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if (!strncmp(input_line, K_branches, strlen(K_branches))) {
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:343:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		rev->log_message = check_calloc(strlen(quoted_line) + 2, 1) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:346:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						 strlen(rev->log_message) +
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:347:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						 strlen(quoted_line) + 2) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/readin.c:352:6:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	    strcat(rev->log_message, "\n") ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:195:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    new = malloc(strlen(s) + 1) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:233:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *tmp = check_malloc(strlen(s1) + strlen(s2) + strlen(s3) + 1) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:233:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *tmp = check_malloc(strlen(s1) + strlen(s2) + strlen(s3) + 1) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:233:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *tmp = check_malloc(strlen(s1) + strlen(s2) + strlen(s3) + 1) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:255:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *tmp = check_malloc(strlen(s1) + strlen(s2) + 1) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:255:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *tmp = check_malloc(strlen(s1) + strlen(s2) + 1) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:269:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(s1, s2, n) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:278:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int previous = strlen(s1) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:280:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
    strncat(s1, s2, n) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:404:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(fname) == 3 && ! strcmp(fname, "RCS")) {
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:406:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	} else if (! strcmp(fname + strlen(fname) - 4, "/RCS")) {
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:411:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if (! strcmp(fname + strlen(fname) - 2, ",v")) {
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:424:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *tmp = check_malloc(strlen(text) * 2) ;
data/shapetools-1.4pl6/src/vc/rcs2atfs/utils.c:438:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    tmp = check_realloc(tmp, strlen(tmp) + 1) ;
data/shapetools-1.4pl6/src/vc/retrv/doretrv.c:475:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((reserveDate = malloc ((unsigned) (strlen ("rtime") + 32)))) {
data/shapetools-1.4pl6/src/vc/retrv/retrv.c:94:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  endPtr = &arg[strlen(arg) - 1];
data/shapetools-1.4pl6/src/vc/save/dosave.c:220:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    intent = (char *)malloc (strlen (xintent) +1);
data/shapetools-1.4pl6/src/vc/save/dosave.c:239:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if ((notetxt = malloc (strlen (rawnotetxt))) != (char *)NULL)
data/shapetools-1.4pl6/src/vc/save/dosave.c:245:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((edbuf = (char *)malloc (strlen (intent) +
data/shapetools-1.4pl6/src/vc/save/dosave.c:246:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 strlen (rawnotetxt) +1)) != (char *)NULL) {
data/shapetools-1.4pl6/src/vc/save/dosave.c:250:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      notetxt = realloc (notetxt, strlen (edbuf));
data/shapetools-1.4pl6/src/vc/save/dosave.c:293:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (fwrite (intent, sizeof (char), strlen (intent), tfd) != strlen (intent)) {
data/shapetools-1.4pl6/src/vc/save/dosave.c:293:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (fwrite (intent, sizeof (char), strlen (intent), tfd) != strlen (intent)) {
data/shapetools-1.4pl6/src/vc/save/dosave.c:341:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((notetxt = malloc ((unsigned)(strlen (intent) + 1))) == (char *) NULL){
data/shapetools-1.4pl6/src/vc/save/dosave.c:359:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (fwrite (text, sizeof (char), strlen (text), fil) != strlen (text))
data/shapetools-1.4pl6/src/vc/save/dosave.c:359:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (fwrite (text, sizeof (char), strlen (text), fil) != strlen (text))
data/shapetools-1.4pl6/src/vc/save/dosave.c:554:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if ((tmpAttr = malloc (strlen(intent)+strlen(AT_ATTINTENT)+2)) == NULL) {
data/shapetools-1.4pl6/src/vc/save/dosave.c:554:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if ((tmpAttr = malloc (strlen(intent)+strlen(AT_ATTINTENT)+2)) == NULL) {
data/shapetools-1.4pl6/src/vc/save/dosave.c:559:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	  strcat (tmpAttr, "=");
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:163:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (lockName, "/");
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:217:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((reserveDate = malloc ((unsigned) (strlen ("rtime") + 32)))) {
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:399:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!strncmp (commentType, "description", strlen (commentType))) {
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:410:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat (outName, "/");
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:425:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if  (!strncmp (commentType, "intent", strlen (commentType))) {
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:436:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat (outName, "/");
data/shapetools-1.4pl6/src/vc/vadm/dovadm.c:466:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if  (!strncmp (commentType, "note", strlen (commentType))) {
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:204:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (arg) > 4)
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:266:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((delAttrs[delAttrCount] = malloc (strlen (attrNamePtr)+1)) == NULL) {
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:381:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (arg) > (AT_CLEADMAXLEN-(strlen(AT_ATTCLEAD)+2))) {
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:381:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (arg) > (AT_CLEADMAXLEN-(strlen(AT_ATTCLEAD)+2))) {
data/shapetools-1.4pl6/src/vc/vadm/vadm.c:479:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (asoName, "/");
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:867:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  prefix = dirPrefix + strlen (dirPrefix);
data/shapetools-1.4pl6/src/vc/vfind/vfind.c:874:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen (name) - 1;
data/shapetools-1.4pl6/src/vc/vl/display.c:100:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int groupNameLen = strlen (group->gr_name), maxLen;
data/shapetools-1.4pl6/src/vc/vl/display.c:109:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy (grPtr, "        ", maxLen);
data/shapetools-1.4pl6/src/vc/vl/display.c:110:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (grPtr, group->gr_name, (groupNameLen > maxLen) ? maxLen : groupNameLen);
data/shapetools-1.4pl6/src/vc/vl/display.c:134:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strcpy (&name[strlen(name)-1], "-drvd]");
data/shapetools-1.4pl6/src/vc/vl/display.c:244:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (userStr, userPtr->af_username, userLen);
data/shapetools-1.4pl6/src/vc/vl/display.c:246:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int len = strlen (userStr);
data/shapetools-1.4pl6/src/vc/vl/display.c:248:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat (userStr, "@");
data/shapetools-1.4pl6/src/vc/vl/display.c:249:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat (userStr, userPtr->af_userdomain, userLen-(len+1));
data/shapetools-1.4pl6/src/vc/vl/display.c:252:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen (userStr);
data/shapetools-1.4pl6/src/vc/vl/display.c:317:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  atExpandAttrs (aso, formatString, strlen (formatString), stdout, 0, AT_EXPAND_FILE);
data/shapetools-1.4pl6/src/vc/vl/display.c:330:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nameLen = strlen (titleName);
data/shapetools-1.4pl6/src/vc/vl/display.c:433:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat (histVinfo, "-");
data/shapetools-1.4pl6/src/vc/vl/display.c:441:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (histVinfo, "]");
data/shapetools-1.4pl6/src/vc/vl/display.c:471:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat (histVinfo, "$");
data/shapetools-1.4pl6/src/vc/vl/display.c:595:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy (lockerStr, tmpUser->af_username, userLen);
data/shapetools-1.4pl6/src/vc/vl/display.c:597:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      int len = strlen (lockerStr);
data/shapetools-1.4pl6/src/vc/vl/display.c:599:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat (lockerStr, "@");
data/shapetools-1.4pl6/src/vc/vl/display.c:600:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
		strncat (lockerStr, tmpUser->af_userdomain, userLen -(len+1));
data/shapetools-1.4pl6/src/vc/vl/display.c:657:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (userStr, lockerStr, userLen);
data/shapetools-1.4pl6/src/vc/vl/display.c:658:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen (userStr);
data/shapetools-1.4pl6/src/vc/vl/display.c:661:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (userStr, userPtr->af_username, userLen);
data/shapetools-1.4pl6/src/vc/vl/display.c:663:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int len = strlen (userStr);
data/shapetools-1.4pl6/src/vc/vl/display.c:665:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat (userStr, "@");
data/shapetools-1.4pl6/src/vc/vl/display.c:666:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat (userStr, userPtr->af_userdomain, userLen-(len+1));
data/shapetools-1.4pl6/src/vc/vl/display.c:669:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen (userStr);
data/shapetools-1.4pl6/src/vc/vl/display.c:770:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nameLen = strlen (nameList[i]);
data/shapetools-1.4pl6/src/vc/vl/display.c:779:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      spaces = colWidth - strlen (nameList[i]);
data/shapetools-1.4pl6/src/vc/vl/display.c:794:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  nameLen = strlen(nameList[nameIdx]);
data/shapetools-1.4pl6/src/vc/vl/vl.c:112:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((formatString = malloc ((unsigned) (strlen (arg) + 2))) == NULL) {
data/shapetools-1.4pl6/src/vc/vl/vl.c:342:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    pathLen = strlen (path) +1; /* additional byte for the '/' */
data/shapetools-1.4pl6/src/vc/vl/vl.c:413:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen (histList[i]) + strlen (nameExt) + pathLen;
data/shapetools-1.4pl6/src/vc/vl/vl.c:413:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen (histList[i]) + strlen (nameExt) + pathLen;
data/shapetools-1.4pl6/src/vc/vl/vl.c:422:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat (nameList[nameIdx], "/");
data/shapetools-1.4pl6/src/vc/vl/vl.c:521:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    pathAddPtr = &examineDir[strlen(examineDir)];
data/shapetools-1.4pl6/src/vc/vl/vl.c:570:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy (examineDir, "");
data/shapetools-1.4pl6/src/vc/vl/vl.c:584:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (newArgv[i][strlen(newArgv[i])-1] == '/') {
data/shapetools-1.4pl6/src/vc/vl/vl.c:585:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      newArgv[i][strlen(newArgv[i])-1] = '\0';
data/shapetools-1.4pl6/src/vc/vl/vl.c:615:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	  strcat (name, ".");
data/shapetools-1.4pl6/src/vc/vl/vl.c:663:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    pathLen = strlen (path) +1; /* additional byte for the '/' */
data/shapetools-1.4pl6/src/vc/vl/vl.c:777:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen (name) + pathLen;
data/shapetools-1.4pl6/src/vc/vl/vl.c:786:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat (nameList[nameIdx], "/");
data/shapetools-1.4pl6/src/vc/vl/vl.c:871:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      pathAddPtr = &examineDir[strlen(examineDir)];
data/shapetools-1.4pl6/src/vc/vl/vl.c:923:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy (examineDir, "");
data/shapetools-1.4pl6/src/vc/vl/vl.c:939:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (newArgv[i][strlen(newArgv[i])-1] == '/') {
data/shapetools-1.4pl6/src/vc/vl/vl.c:940:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      newArgv[i][strlen(newArgv[i])-1] = '\0';
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:229:1:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
equal(s1, s2)
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:252:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    if (equal(s, dfa->charclasses[i]))
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:344:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(s);
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:594:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		      lexptr += strlen(prednames[c1].name);
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:595:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		      lexleft -= strlen(prednames[c1].name);
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:2072:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  newsize = (new == NULL) ? 0 : strlen(new);
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:2077:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else	oldsize = strlen(old);
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:2102:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(lookfor);
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:2227:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      old = enlist(old, new[i], strlen(new[i]));
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:2374:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    ln = strlen(lmp->right);
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:2375:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    rn = strlen(rmp->right);
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:2403:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if (strlen(musts[0].in[i]) > strlen(result))
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:2403:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if (strlen(musts[0].in[i]) > strlen(result))
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:2435:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 strlen(tp));
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:2506:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(result))
data/shapetools-1.4pl6/vgrep-2.0/dfa.c:2510:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      dm->must = malloc(strlen(result) + 1);
data/shapetools-1.4pl6/vgrep-2.0/getopt.c:457:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if (s - nextchar == strlen (p->name))
data/shapetools-1.4pl6/vgrep-2.0/getopt.c:481:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  nextchar += strlen (nextchar);
data/shapetools-1.4pl6/vgrep-2.0/getopt.c:511:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  nextchar += strlen (nextchar);
data/shapetools-1.4pl6/vgrep-2.0/getopt.c:524:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  nextchar += strlen (nextchar);
data/shapetools-1.4pl6/vgrep-2.0/getopt.c:528:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  nextchar += strlen (nextchar);
data/shapetools-1.4pl6/vgrep-2.0/grep.c:56:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
extern int open(), read(), close();
data/shapetools-1.4pl6/vgrep-2.0/grep.c:688:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cc = strlen(optarg);
data/shapetools-1.4pl6/vgrep-2.0/grep.c:764:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	keycc = strlen(keys);
data/shapetools-1.4pl6/vgrep-2.0/regex.c:4718:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ret = regex_compile (s, strlen (s), re_syntax_options, &re_comp_buf);
data/shapetools-1.4pl6/vgrep-2.0/regex.c:4729:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const int len = strlen (s);
data/shapetools-1.4pl6/vgrep-2.0/regex.c:4825:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ret = regex_compile (pattern, strlen (pattern), syntax, preg);
data/shapetools-1.4pl6/vgrep-2.0/regex.c:4860:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = strlen (string);
data/shapetools-1.4pl6/vgrep-2.0/regex.c:4939:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  msg_size = strlen (msg) + 1; /* Includes the null.  */
data/shapetools-1.4pl6/vgrep-2.0/regex.c:4945:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy (errbuf, msg, errbuf_size - 1);
data/shapetools-1.4pl6/vgrep-2.0/search.c:154:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if ((err = kwsincr(kwset, dm->must, strlen(dm->must))) != 0)
data/shapetools-1.4pl6/vgrep-2.0/search.c:163:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if ((err = kwsincr(kwset, dm->must, strlen(dm->must))) != 0)
data/shapetools-1.4pl6/vgrep-2.0/search.c:204:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      strcpy(n, "");
data/shapetools-1.4pl6/vgrep-2.0/search.c:211:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      i = strlen(n);
data/shapetools-1.4pl6/vgrep-2.0/search.c:220:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      i += strlen(n + i);
data/shapetools-1.4pl6/vgrep-2.0/search.c:270:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      strcpy(n, "");
data/shapetools-1.4pl6/vgrep-2.0/search.c:277:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      i = strlen(n);
data/shapetools-1.4pl6/vgrep-2.0/search.c:286:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      i += strlen(n + i);

ANALYSIS SUMMARY:

Hits = 2251
Lines analyzed = 55950 in approximately 1.73 seconds (32305 lines/second)
Physical Source Lines of Code (SLOC) = 39383
Hits@level = [0] 673 [1] 539 [2] 635 [3]  32 [4] 1008 [5]  37
Hits@level+ = [0+] 2924 [1+] 2251 [2+] 1712 [3+] 1077 [4+] 1045 [5+]  37
Hits/KSLOC@level+ = [0+] 74.2452 [1+] 57.1566 [2+] 43.4705 [3+] 27.3468 [4+] 26.5343 [5+] 0.939492
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.