Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/z88-13.0.0+dfsg2/src/rea88x.c
Examining data/z88-13.0.0+dfsg2/src/r1y88i.c
Examining data/z88-13.0.0+dfsg2/src/ale88e.c
Examining data/z88-13.0.0+dfsg2/src/dyn88x.c
Examining data/z88-13.0.0+dfsg2/src/stop88g.c
Examining data/z88-13.0.0+dfsg2/src/slqu88.c
Examining data/z88-13.0.0+dfsg2/src/m9.c
Examining data/z88-13.0.0+dfsg2/src/z88h.h
Examining data/z88-13.0.0+dfsg2/src/riy88d.c
Examining data/z88-13.0.0+dfsg2/src/gxi288.c
Examining data/z88-13.0.0+dfsg2/src/lan88v.c
Examining data/z88-13.0.0+dfsg2/src/g1i188.c
Examining data/z88-13.0.0+dfsg2/src/m16.c
Examining data/z88-13.0.0+dfsg2/src/rdy88h.c
Examining data/z88-13.0.0+dfsg2/src/lan88i2.c
Examining data/z88-13.0.0+dfsg2/src/z88b.c
Examining data/z88-13.0.0+dfsg2/src/m2.c
Examining data/z88-13.0.0+dfsg2/src/stop88v.c
Examining data/z88-13.0.0+dfsg2/src/hexa88.c
Examining data/z88-13.0.0+dfsg2/src/lan88i1.c
Examining data/z88-13.0.0+dfsg2/src/isod88.c
Examining data/z88-13.0.0+dfsg2/src/z88n.c
Examining data/z88-13.0.0+dfsg2/src/hpla88.c
Examining data/z88-13.0.0+dfsg2/src/riy88.c
Examining data/z88-13.0.0+dfsg2/src/bapla88.c
Examining data/z88-13.0.0+dfsg2/src/z88ci.c
Examining data/z88-13.0.0+dfsg2/src/spur88.c
Examining data/z88-13.0.0+dfsg2/src/bcshe88.c
Examining data/z88-13.0.0+dfsg2/src/dnas88.c
Examining data/z88-13.0.0+dfsg2/src/who88x.c
Examining data/z88-13.0.0+dfsg2/src/stop88i.c
Examining data/z88-13.0.0+dfsg2/src/bspla88.c
Examining data/z88-13.0.0+dfsg2/src/wlog88g.c
Examining data/z88-13.0.0+dfsg2/src/z88f.h
Examining data/z88-13.0.0+dfsg2/src/sspl88.c
Examining data/z88-13.0.0+dfsg2/src/wlog88v.c
Examining data/z88-13.0.0+dfsg2/src/r4y88i.c
Examining data/z88-13.0.0+dfsg2/src/who88d.c
Examining data/z88-13.0.0+dfsg2/src/z88i2.c
Examining data/z88-13.0.0+dfsg2/src/w4y88i.c
Examining data/z88-13.0.0+dfsg2/src/m1.c
Examining data/z88-13.0.0+dfsg2/src/ale88d.c
Examining data/z88-13.0.0+dfsg2/src/wria88x.c
Examining data/z88-13.0.0+dfsg2/src/mc188n.c
Examining data/z88-13.0.0+dfsg2/src/who88f.c
Examining data/z88-13.0.0+dfsg2/src/z88e.c
Examining data/z88-13.0.0+dfsg2/src/cosm88.c
Examining data/z88-13.0.0+dfsg2/src/z88bi.c
Examining data/z88-13.0.0+dfsg2/src/wlog88h.c
Examining data/z88-13.0.0+dfsg2/src/rcol88c.c
Examining data/z88-13.0.0+dfsg2/src/who88i1.c
Examining data/z88-13.0.0+dfsg2/src/stop88d.c
Examining data/z88-13.0.0+dfsg2/src/wrim88h.c
Examining data/z88-13.0.0+dfsg2/src/nast88.c
Examining data/z88-13.0.0+dfsg2/src/cb88o.c
Examining data/z88-13.0.0+dfsg2/src/g4i188.c
Examining data/z88-13.0.0+dfsg2/src/mc588n.c
Examining data/z88-13.0.0+dfsg2/src/wlog88c.c
Examining data/z88-13.0.0+dfsg2/src/z88o.c
Examining data/z88-13.0.0+dfsg2/src/who88i2.c
Examining data/z88-13.0.0+dfsg2/src/z88n.h
Examining data/z88-13.0.0+dfsg2/src/ri588.c
Examining data/z88-13.0.0+dfsg2/src/z88i.h
Examining data/z88-13.0.0+dfsg2/src/rni88.c
Examining data/z88-13.0.0+dfsg2/src/spla88.c
Examining data/z88-13.0.0+dfsg2/src/bhpla88.c
Examining data/z88-13.0.0+dfsg2/src/lqua88.c
Examining data/z88-13.0.0+dfsg2/src/dyn88i1.c
Examining data/z88-13.0.0+dfsg2/src/dyn88e.c
Examining data/z88-13.0.0+dfsg2/src/m4.c
Examining data/z88-13.0.0+dfsg2/src/who88h.c
Examining data/z88-13.0.0+dfsg2/src/wrim88d.c
Examining data/z88-13.0.0+dfsg2/src/g1i388.c
Examining data/z88-13.0.0+dfsg2/src/lan88f.c
Examining data/z88-13.0.0+dfsg2/src/koi88x.c
Examining data/z88-13.0.0+dfsg2/src/lan88o.c
Examining data/z88-13.0.0+dfsg2/src/z88cc.c
Examining data/z88-13.0.0+dfsg2/src/bhexa88.c
Examining data/z88-13.0.0+dfsg2/src/z88v.c
Examining data/z88-13.0.0+dfsg2/src/z88a.c
Examining data/z88-13.0.0+dfsg2/src/fuvs88.c
Examining data/z88-13.0.0+dfsg2/src/ale88n.c
Examining data/z88-13.0.0+dfsg2/src/lan88e.c
Examining data/z88-13.0.0+dfsg2/src/ri188.c
Examining data/z88-13.0.0+dfsg2/src/g5i188.c
Examining data/z88-13.0.0+dfsg2/src/gxi588.c
Examining data/z88-13.0.0+dfsg2/src/cshe88.c
Examining data/z88-13.0.0+dfsg2/src/wrim88g.c
Examining data/z88-13.0.0+dfsg2/src/lan88d.c
Examining data/z88-13.0.0+dfsg2/src/z88g.c
Examining data/z88-13.0.0+dfsg2/src/dyn88n.c
Examining data/z88-13.0.0+dfsg2/src/z88tx.c
Examining data/z88-13.0.0+dfsg2/src/clr88.c
Examining data/z88-13.0.0+dfsg2/src/ale88i.c
Examining data/z88-13.0.0+dfsg2/src/apla88.c
Examining data/z88-13.0.0+dfsg2/src/stop88n.c
Examining data/z88-13.0.0+dfsg2/src/z88e.h
Examining data/z88-13.0.0+dfsg2/src/sspu88.c
Examining data/z88-13.0.0+dfsg2/src/sub88x.c
Examining data/z88-13.0.0+dfsg2/src/rcoo88.c
Examining data/z88-13.0.0+dfsg2/src/sapl88.c
Examining data/z88-13.0.0+dfsg2/src/stet88.c
Examining data/z88-13.0.0+dfsg2/src/wlog88e.c
Examining data/z88-13.0.0+dfsg2/src/z88h.c
Examining data/z88-13.0.0+dfsg2/src/wlog88d.c
Examining data/z88-13.0.0+dfsg2/src/z88com.h
Examining data/z88-13.0.0+dfsg2/src/bqshe88.c
Examining data/z88-13.0.0+dfsg2/src/dyn88v.c
Examining data/z88-13.0.0+dfsg2/src/ale88x.c
Examining data/z88-13.0.0+dfsg2/src/ale88f.c
Examining data/z88-13.0.0+dfsg2/src/ale88g.c
Examining data/z88-13.0.0+dfsg2/src/m15.c
Examining data/z88-13.0.0+dfsg2/src/stop88e.c
Examining data/z88-13.0.0+dfsg2/src/who88n.c
Examining data/z88-13.0.0+dfsg2/src/z88d.c
Examining data/z88-13.0.0+dfsg2/src/g1i488.c
Examining data/z88-13.0.0+dfsg2/src/ale88h.c
Examining data/z88-13.0.0+dfsg2/src/z88fx.c
Examining data/z88-13.0.0+dfsg2/src/dyn88d.c
Examining data/z88-13.0.0+dfsg2/src/who88g.c
Examining data/z88-13.0.0+dfsg2/src/z88ai.c
Examining data/z88-13.0.0+dfsg2/src/z88i1.c
Examining data/z88-13.0.0+dfsg2/src/mc488n.c
Examining data/z88-13.0.0+dfsg2/src/ale88o.c
Examining data/z88-13.0.0+dfsg2/src/z88com.c
Examining data/z88-13.0.0+dfsg2/src/z88o.h
Examining data/z88-13.0.0+dfsg2/src/mc288n.c
Examining data/z88-13.0.0+dfsg2/src/stop88h.c
Examining data/z88-13.0.0+dfsg2/src/z88f.c
Examining data/z88-13.0.0+dfsg2/src/stop88f.c
Examining data/z88-13.0.0+dfsg2/src/g2i188.c
Examining data/z88-13.0.0+dfsg2/src/sqsh88.c
Examining data/z88-13.0.0+dfsg2/src/lan88g.c
Examining data/z88-13.0.0+dfsg2/src/fr_func.c
Examining data/z88-13.0.0+dfsg2/src/m12.c
Examining data/z88-13.0.0+dfsg2/src/z88g.h
Examining data/z88-13.0.0+dfsg2/src/stop88x.c
Examining data/z88-13.0.0+dfsg2/src/lan88n.c
Examining data/z88-13.0.0+dfsg2/src/prfl88.c
Examining data/z88-13.0.0+dfsg2/src/ri188i.c
Examining data/z88-13.0.0+dfsg2/src/shpl88.c
Examining data/z88-13.0.0+dfsg2/src/lan88c.c
Examining data/z88-13.0.0+dfsg2/src/blqua88.c
Examining data/z88-13.0.0+dfsg2/src/btetr88.c
Examining data/z88-13.0.0+dfsg2/src/dyn88o.c
Examining data/z88-13.0.0+dfsg2/src/wlog88i2.c
Examining data/z88-13.0.0+dfsg2/src/g3i188.c
Examining data/z88-13.0.0+dfsg2/src/dyn88i2.c
Examining data/z88-13.0.0+dfsg2/src/ri588i.c
Examining data/z88-13.0.0+dfsg2/src/subn88.c
Examining data/z88-13.0.0+dfsg2/src/wlog88o.c
Examining data/z88-13.0.0+dfsg2/src/oc88.c
Examining data/z88-13.0.0+dfsg2/src/lan88x.c
Examining data/z88-13.0.0+dfsg2/src/who88v.c
Examining data/z88-13.0.0+dfsg2/src/z88v.h
Examining data/z88-13.0.0+dfsg2/src/ale88v.c
Examining data/z88-13.0.0+dfsg2/src/lan88h.c
Examining data/z88-13.0.0+dfsg2/src/z88x.c
Examining data/z88-13.0.0+dfsg2/src/bspur88.c
Examining data/z88-13.0.0+dfsg2/src/z88x.h
Examining data/z88-13.0.0+dfsg2/src/tetr88.c
Examining data/z88-13.0.0+dfsg2/src/m3.c
Examining data/z88-13.0.0+dfsg2/src/shex88.c
Examining data/z88-13.0.0+dfsg2/src/siso88.c
Examining data/z88-13.0.0+dfsg2/src/span88.c
Examining data/z88-13.0.0+dfsg2/src/who88e.c
Examining data/z88-13.0.0+dfsg2/src/mc388n.c
Examining data/z88-13.0.0+dfsg2/src/dyn88f.c
Examining data/z88-13.0.0+dfsg2/src/forc88.c
Examining data/z88-13.0.0+dfsg2/src/vend88.c
Examining data/z88-13.0.0+dfsg2/src/m10.c
Examining data/z88-13.0.0+dfsg2/src/choy88.c
Examining data/z88-13.0.0+dfsg2/src/z88math.h
Examining data/z88-13.0.0+dfsg2/src/scsh88.c
Examining data/z88-13.0.0+dfsg2/src/join88.c
Examining data/z88-13.0.0+dfsg2/src/qshe88.c
Examining data/z88-13.0.0+dfsg2/src/z88d.h
Examining data/z88-13.0.0+dfsg2/src/wrim88e.c
Examining data/z88-13.0.0+dfsg2/src/jaco88.c
Examining data/z88-13.0.0+dfsg2/src/ale88c.c
Examining data/z88-13.0.0+dfsg2/src/cb88c.c
Examining data/z88-13.0.0+dfsg2/src/wlog88f.c
Examining data/z88-13.0.0+dfsg2/src/wlog88i1.c
Examining data/z88-13.0.0+dfsg2/src/wlog88n.c
Examining data/z88-13.0.0+dfsg2/src/wlog88x.c
Examining data/z88-13.0.0+dfsg2/src/wria88f.c
Examining data/z88-13.0.0+dfsg2/src/wria88i.c
Examining data/z88-13.0.0+dfsg2/src/wrim88f.c
Examining data/z88-13.0.0+dfsg2/src/wrim88i.c
Examining data/z88-13.0.0+dfsg2/src/wrim88n.c
Examining data/z88-13.0.0+dfsg2/src/wrim88x.c

FINAL RESULTS:

data/z88-13.0.0+dfsg2/src/cb88c.c:74:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:76:1:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:79:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:105:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(cmess,cbytes);    
data/z88-13.0.0+dfsg2/src/cb88c.c:109:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(cmess,cbytes);   
data/z88-13.0.0+dfsg2/src/cb88c.c:113:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(cmess,cbytes);
data/z88-13.0.0+dfsg2/src/cb88c.c:117:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(cmess,cbytes); 
data/z88-13.0.0+dfsg2/src/cb88c.c:121:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(cmess,cbytes);   
data/z88-13.0.0+dfsg2/src/cb88c.c:124:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(cmess,cbytes);
data/z88-13.0.0+dfsg2/src/cb88c.c:177:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system("z88v");
data/z88-13.0.0+dfsg2/src/cb88c.c:182:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:184:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:187:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:205:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system("z88n");
data/z88-13.0.0+dfsg2/src/cb88c.c:210:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:212:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:215:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:233:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system("z88d");
data/z88-13.0.0+dfsg2/src/cb88c.c:238:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:240:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:243:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:261:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system("z88e");
data/z88-13.0.0+dfsg2/src/cb88c.c:266:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:268:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:271:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:289:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system("z88g");
data/z88-13.0.0+dfsg2/src/cb88c.c:294:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:296:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:299:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:317:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system("z88h");
data/z88-13.0.0+dfsg2/src/cb88c.c:322:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:324:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:327:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:345:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system("z88o");
data/z88-13.0.0+dfsg2/src/cb88c.c:350:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:352:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:355:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:373:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CEDITOR);
data/z88-13.0.0+dfsg2/src/cb88c.c:375:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:380:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:382:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:385:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:403:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CEDITOR);
data/z88-13.0.0+dfsg2/src/cb88c.c:405:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:420:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:422:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:425:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:443:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CEDITOR);
data/z88-13.0.0+dfsg2/src/cb88c.c:445:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:450:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:452:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:455:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:473:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CEDITOR);
data/z88-13.0.0+dfsg2/src/cb88c.c:475:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:480:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:482:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:485:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:503:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CEDITOR);
data/z88-13.0.0+dfsg2/src/cb88c.c:505:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:510:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:512:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:515:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:533:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CEDITOR);
data/z88-13.0.0+dfsg2/src/cb88c.c:535:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:540:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:542:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:545:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:563:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CEDITOR);
data/z88-13.0.0+dfsg2/src/cb88c.c:565:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:570:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:572:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:575:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:593:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CEDITOR);
data/z88-13.0.0+dfsg2/src/cb88c.c:595:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:600:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:602:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:605:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:623:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CEDITOR);
data/z88-13.0.0+dfsg2/src/cb88c.c:625:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:630:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:632:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:635:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:653:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CEDITOR);
data/z88-13.0.0+dfsg2/src/cb88c.c:655:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:660:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:662:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:665:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:683:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CEDITOR);
data/z88-13.0.0+dfsg2/src/cb88c.c:685:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:690:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:692:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:695:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:713:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CEDITOR);
data/z88-13.0.0+dfsg2/src/cb88c.c:715:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:720:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:722:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:725:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:743:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CEDITOR);
data/z88-13.0.0+dfsg2/src/cb88c.c:745:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:750:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:752:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:755:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:773:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system("z88x -i1tx");
data/z88-13.0.0+dfsg2/src/cb88c.c:778:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:780:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:783:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:801:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system("z88x -iatx");
data/z88-13.0.0+dfsg2/src/cb88c.c:806:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:808:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:811:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:829:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system("z88x -nitx");
data/z88-13.0.0+dfsg2/src/cb88c.c:834:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:836:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:839:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:857:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system("z88x -i1fx");
data/z88-13.0.0+dfsg2/src/cb88c.c:862:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:864:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:867:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:885:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system("z88x -iafx");
data/z88-13.0.0+dfsg2/src/cb88c.c:890:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:892:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:895:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:913:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system("z88x -nifx");
data/z88-13.0.0+dfsg2/src/cb88c.c:918:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:920:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:923:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:941:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system("z88f -c");
data/z88-13.0.0+dfsg2/src/cb88c.c:946:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:948:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:951:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:969:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system("z88f -t");
data/z88-13.0.0+dfsg2/src/cb88c.c:974:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:976:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:979:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:997:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system("z88i1");
data/z88-13.0.0+dfsg2/src/cb88c.c:1002:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:1004:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:1007:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:1025:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system("z88i2 -c");
data/z88-13.0.0+dfsg2/src/cb88c.c:1030:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:1032:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:1035:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:1053:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system("z88i2 -s");
data/z88-13.0.0+dfsg2/src/cb88c.c:1058:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:1060:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:1063:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88c.c:1081:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system("z88par");
data/z88-13.0.0+dfsg2/src/cb88c.c:1086:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88c.c:1088:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88c.c:1091:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88o.c:359:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(cmess,cbytes);    
data/z88-13.0.0+dfsg2/src/cb88o.c:363:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(cmess,cbytes);   
data/z88-13.0.0+dfsg2/src/cb88o.c:367:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(cmess,cbytes);
data/z88-13.0.0+dfsg2/src/cb88o.c:371:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(cmess,cbytes); 
data/z88-13.0.0+dfsg2/src/cb88o.c:375:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(cmess,cbytes);   
data/z88-13.0.0+dfsg2/src/cb88o.c:378:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(cmess,cbytes);
data/z88-13.0.0+dfsg2/src/cb88o.c:397:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy(command,CBROWSER);
data/z88-13.0.0+dfsg2/src/cb88o.c:399:1:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
strcat(command,CPREFIX);
data/z88-13.0.0+dfsg2/src/cb88o.c:402:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
iret= system(command);
data/z88-13.0.0+dfsg2/src/cb88o.c:473:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cstrn,cfilename);
data/z88-13.0.0+dfsg2/src/clr88.c:50:1:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
system("tput clear");
data/z88-13.0.0+dfsg2/src/dnas88.c:221:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      sscanf(c2zeile,"%s %s %ld",cdummy,cdummy2,&ispc);
data/z88-13.0.0+dfsg2/src/dnas88.c:228:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        sscanf(c2zeile,"%s %s %ld",cdummy,cdummy2,&iload);
data/z88-13.0.0+dfsg2/src/dnas88.c:274:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cstring,"%s %ld %lf %lf",cdummy,&idummy,&emod,&rnue);
data/z88-13.0.0+dfsg2/src/dnas88.c:289:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cstring,"%s %ld",cdummy,&idummy);
data/z88-13.0.0+dfsg2/src/dnas88.c:296:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cstring,"%s %ld %ld %ld %lf %lf %lf %lf",
data/z88-13.0.0+dfsg2/src/dnas88.c:312:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cstring,"%s %ld %ld %lf %lf %lf %ld %ld",
data/z88-13.0.0+dfsg2/src/dnas88.c:488:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cstring,"%s %ld %ld %lf %lf %lf",
data/z88-13.0.0+dfsg2/src/dnas88.c:511:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cstring,"%s %ld %ld %ld %ld %ld %ld %ld %ld",
data/z88-13.0.0+dfsg2/src/dnas88.c:564:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cstring,"%s %ld %ld %ld %lf",cdummy,&idummy,&nkn,&ifg,&wert);
data/z88-13.0.0+dfsg2/src/dnas88.c:576:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cstring,"%s %ld %ld %ld %lf %lf %lf %lf",
data/z88-13.0.0+dfsg2/src/dnas88.c:606:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cstring,"%s %ld %ld %lf %lf %lf %ld %ld",
data/z88-13.0.0+dfsg2/src/dyn88d.c:151:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXKOI);
data/z88-13.0.0+dfsg2/src/dyn88d.c:153:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXK);
data/z88-13.0.0+dfsg2/src/dyn88d.c:155:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXE);
data/z88-13.0.0+dfsg2/src/dyn88d.c:157:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXNFG);
data/z88-13.0.0+dfsg2/src/dyn88d.c:159:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXNEG);
data/z88-13.0.0+dfsg2/src/dyn88e.c:155:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXKOI);
data/z88-13.0.0+dfsg2/src/dyn88e.c:157:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXK);
data/z88-13.0.0+dfsg2/src/dyn88e.c:159:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXE);
data/z88-13.0.0+dfsg2/src/dyn88e.c:161:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXNFG);
data/z88-13.0.0+dfsg2/src/dyn88e.c:163:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXNEG);
data/z88-13.0.0+dfsg2/src/dyn88f.c:164:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXGS);
data/z88-13.0.0+dfsg2/src/dyn88f.c:166:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXKOI);
data/z88-13.0.0+dfsg2/src/dyn88f.c:168:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXK);
data/z88-13.0.0+dfsg2/src/dyn88f.c:170:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXE);
data/z88-13.0.0+dfsg2/src/dyn88f.c:172:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXNFG);
data/z88-13.0.0+dfsg2/src/dyn88f.c:174:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXNEG);
data/z88-13.0.0+dfsg2/src/dyn88f.c:176:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXPR);
data/z88-13.0.0+dfsg2/src/dyn88i1.c:147:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXGS);
data/z88-13.0.0+dfsg2/src/dyn88i1.c:149:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXKOI);
data/z88-13.0.0+dfsg2/src/dyn88i1.c:151:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXK);
data/z88-13.0.0+dfsg2/src/dyn88i1.c:153:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXE);
data/z88-13.0.0+dfsg2/src/dyn88i1.c:155:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXNFG);
data/z88-13.0.0+dfsg2/src/dyn88i1.c:157:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXNEG);
data/z88-13.0.0+dfsg2/src/dyn88i1.c:159:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXIEZ);
data/z88-13.0.0+dfsg2/src/dyn88i2.c:173:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXGS);
data/z88-13.0.0+dfsg2/src/dyn88i2.c:175:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXKOI);
data/z88-13.0.0+dfsg2/src/dyn88i2.c:177:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXK);
data/z88-13.0.0+dfsg2/src/dyn88i2.c:179:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXE);
data/z88-13.0.0+dfsg2/src/dyn88i2.c:181:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXNFG);
data/z88-13.0.0+dfsg2/src/dyn88i2.c:183:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXNEG);
data/z88-13.0.0+dfsg2/src/dyn88i2.c:185:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          sscanf(cline,CFORMA,cdummy,&MAXPR);
data/z88-13.0.0+dfsg2/src/dyn88n.c:141:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXSE);
data/z88-13.0.0+dfsg2/src/dyn88n.c:143:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXESS);
data/z88-13.0.0+dfsg2/src/dyn88n.c:145:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXKSS);
data/z88-13.0.0+dfsg2/src/dyn88n.c:147:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXAN);
data/z88-13.0.0+dfsg2/src/dyn88n.c:158:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXK);
data/z88-13.0.0+dfsg2/src/dyn88n.c:160:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXE);
data/z88-13.0.0+dfsg2/src/dyn88n.c:162:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXNFG);
data/z88-13.0.0+dfsg2/src/dyn88n.c:164:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXNEG);
data/z88-13.0.0+dfsg2/src/dyn88o.c:147:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXKOI);
data/z88-13.0.0+dfsg2/src/dyn88o.c:149:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXE);
data/z88-13.0.0+dfsg2/src/dyn88o.c:151:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXK);
data/z88-13.0.0+dfsg2/src/dyn88o.c:153:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXNEG);
data/z88-13.0.0+dfsg2/src/dyn88o.c:155:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXRBD);
data/z88-13.0.0+dfsg2/src/dyn88o.c:157:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXPR);
data/z88-13.0.0+dfsg2/src/dyn88o.c:159:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXGP);
data/z88-13.0.0+dfsg2/src/dyn88v.c:120:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXSE);
data/z88-13.0.0+dfsg2/src/dyn88v.c:122:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXESS);
data/z88-13.0.0+dfsg2/src/dyn88v.c:124:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXKSS);
data/z88-13.0.0+dfsg2/src/dyn88v.c:126:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXAN);
data/z88-13.0.0+dfsg2/src/dyn88v.c:137:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXGS);
data/z88-13.0.0+dfsg2/src/dyn88v.c:139:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXKOI);
data/z88-13.0.0+dfsg2/src/dyn88v.c:141:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXK);
data/z88-13.0.0+dfsg2/src/dyn88v.c:143:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXE);
data/z88-13.0.0+dfsg2/src/dyn88v.c:145:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXNFG);
data/z88-13.0.0+dfsg2/src/dyn88v.c:147:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXNEG);
data/z88-13.0.0+dfsg2/src/dyn88v.c:149:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXPR);
data/z88-13.0.0+dfsg2/src/dyn88v.c:151:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXIEZ);
data/z88-13.0.0+dfsg2/src/dyn88v.c:153:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXRBD);
data/z88-13.0.0+dfsg2/src/dyn88v.c:155:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXGP);
data/z88-13.0.0+dfsg2/src/dyn88x.c:166:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXKOI);
data/z88-13.0.0+dfsg2/src/dyn88x.c:168:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXK);
data/z88-13.0.0+dfsg2/src/dyn88x.c:170:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXE);
data/z88-13.0.0+dfsg2/src/dyn88x.c:172:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXNFG);
data/z88-13.0.0+dfsg2/src/dyn88x.c:174:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXNEG);
data/z88-13.0.0+dfsg2/src/dyn88x.c:176:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXPR);
data/z88-13.0.0+dfsg2/src/fr_func.c:56:1:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
scanf("%s",cstring);
data/z88-13.0.0+dfsg2/src/g4i188.c:604:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(clina,cline);
data/z88-13.0.0+dfsg2/src/gxi288.c:180:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(clina,cline);
data/z88-13.0.0+dfsg2/src/m16.c:363:1:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
sscanf(cline,PD,&npr);
data/z88-13.0.0+dfsg2/src/m16.c:378:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf(cline,PD,&nep[i]); 
data/z88-13.0.0+dfsg2/src/m16.c:394:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG BPG BPD BPD BPD,&idummy,&rdummy,&sdummy,
data/z88-13.0.0+dfsg2/src/m16.c:409:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG BPD BPD BPD,&idummy,&rdummy,
data/z88-13.0.0+dfsg2/src/m16.c:424:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG BPD BPD BPD BPD BPD BPD,
data/z88-13.0.0+dfsg2/src/m16.c:442:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG BPG BPG BPD BPD BPD BPD BPD BPD BPD BPD,
data/z88-13.0.0+dfsg2/src/m16.c:461:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG BPG BPG BPD BPD BPD BPD,
data/z88-13.0.0+dfsg2/src/m16.c:478:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG BPG BPD BPD BPD BPD,
data/z88-13.0.0+dfsg2/src/m16.c:492:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG,&idummy,&rdummy); 
data/z88-13.0.0+dfsg2/src/m3.c:131:15:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
if(LANG == 1) fprintf(fo3,"\n\nElement # = " P5D "     Typ = Stab in Ebene\
data/z88-13.0.0+dfsg2/src/m3.c:133:15:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
if(LANG == 2) fprintf(fo3,"\n\nelement # = " P5D "     type = truss in plane\
data/z88-13.0.0+dfsg2/src/m3.c:182:15:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
if(LANG == 1) fprintf(fo3,"\n\nElement # = " P5D "     Typ = Stab im Raum\
data/z88-13.0.0+dfsg2/src/m3.c:184:15:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
if(LANG == 2) fprintf(fo3,"\n\nelement # = " P5D "     type = truss in space\
data/z88-13.0.0+dfsg2/src/m3.c:232:1:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
fprintf(fo3,NL P11EB P11EB P11EB P11EB P11EB P11E,
data/z88-13.0.0+dfsg2/src/m3.c:323:1:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
fprintf(fo3,NL P11EB P11EB P11EB P11EB P11EB P11E, 
data/z88-13.0.0+dfsg2/src/m3.c:382:1:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
fprintf(fo3,NL P11E "                               " P11E\
data/z88-13.0.0+dfsg2/src/nast88.c:208:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      sscanf(c2zeile,"%s %s %ld",cdummy,cdummy2,&ispc);
data/z88-13.0.0+dfsg2/src/nast88.c:215:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        sscanf(c2zeile,"%s %s %ld",cdummy,cdummy2,&iload);
data/z88-13.0.0+dfsg2/src/nast88.c:261:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cstring,"%s %ld %lf %lf",cdummy,&idummy,&emod,&rnue);
data/z88-13.0.0+dfsg2/src/nast88.c:277:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cstring,"%s %ld %ld %lf",cdummy,&idummy,&jdummy,&qpara);    
data/z88-13.0.0+dfsg2/src/nast88.c:284:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cstring,"%s %ld",cdummy,&idummy);
data/z88-13.0.0+dfsg2/src/nast88.c:291:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cstring,"%s %ld %ld %ld %lf %lf %lf %lf",
data/z88-13.0.0+dfsg2/src/nast88.c:309:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      sscanf(cstring,"%s %ld %ld %lf",cdummy,&idummy,&jdummy,&rdummy);
data/z88-13.0.0+dfsg2/src/nast88.c:406:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cstring,"%s %ld %ld %lf %lf %lf",
data/z88-13.0.0+dfsg2/src/nast88.c:423:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cstring,"%s %ld %ld %ld %ld %ld %ld %ld %ld",
data/z88-13.0.0+dfsg2/src/nast88.c:480:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cstring,"%s %ld %ld %ld %ld %ld %ld %ld %ld",
data/z88-13.0.0+dfsg2/src/nast88.c:516:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cstring,"%s %ld %ld %ld %ld %ld %ld %ld %ld",
data/z88-13.0.0+dfsg2/src/nast88.c:532:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cstring,"%s %ld %ld %ld %lf",cdummy,&idummy,&nkn,&ipuf,&wert);
data/z88-13.0.0+dfsg2/src/nast88.c:558:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cstring,"%s %ld %ld %ld %lf %lf %lf %lf",
data/z88-13.0.0+dfsg2/src/nast88.c:702:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      sscanf(cstring,"%s %ld %ld %lf",cdummy,&idummy,&jdummy,&rdummy);
data/z88-13.0.0+dfsg2/src/prfl88.c:136:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo1,"Element#" B5D "   Normallast" B13E "   Schub r" B13E\
data/z88-13.0.0+dfsg2/src/prfl88.c:140:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo1,"element#" B5D "   normal load" B13E "  shear r" B13E\
data/z88-13.0.0+dfsg2/src/prfl88.c:151:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo1,"Element#" B5D "   Druck" B13E "   Knoten" B5D B5D B5D NL,
data/z88-13.0.0+dfsg2/src/prfl88.c:154:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo1,"element#" B5D "   pressure" B13E "   nodes" B5D B5D B5D NL,
data/z88-13.0.0+dfsg2/src/prfl88.c:164:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo1,"Element#" B5D "   Druck" B13E\
data/z88-13.0.0+dfsg2/src/prfl88.c:169:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo1,"element#" B5D "   pressure " B13E\
data/z88-13.0.0+dfsg2/src/prfl88.c:181:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo1,
data/z88-13.0.0+dfsg2/src/prfl88.c:188:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo1,
data/z88-13.0.0+dfsg2/src/prfl88.c:202:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo1,
data/z88-13.0.0+dfsg2/src/prfl88.c:208:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo1,
data/z88-13.0.0+dfsg2/src/prfl88.c:221:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo1,"Element#" B5D "   Normallast" B13E "   Schub r" B13E\
data/z88-13.0.0+dfsg2/src/prfl88.c:225:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo1,"element#" B5D "   normal load" B13E "  shear r" B13E\
data/z88-13.0.0+dfsg2/src/prfl88.c:236:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo1,"Element#" B5D "   Druck" B13E NL,nep[j],pres[j]);
data/z88-13.0.0+dfsg2/src/prfl88.c:238:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo1,"Element#" B5D "   pressure" B13E NL,nep[j],pres[j]); 
data/z88-13.0.0+dfsg2/src/rcol88c.c:99:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %s",cdummy,CEDITOR);
data/z88-13.0.0+dfsg2/src/rcol88c.c:101:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %s",cdummy,CBROWSER);
data/z88-13.0.0+dfsg2/src/rcol88c.c:103:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %s",cdummy,CPREFIX);
data/z88-13.0.0+dfsg2/src/rcoo88.c:119:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %s",cdummy,CBROWSER);
data/z88-13.0.0+dfsg2/src/rcoo88.c:121:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %s",cdummy,CPREFIX);
data/z88-13.0.0+dfsg2/src/rcoo88.c:158:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %d",cdummy,&IW_DRAWAR);
data/z88-13.0.0+dfsg2/src/rcoo88.c:160:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %d",cdummy,&IH_DRAWAR);
data/z88-13.0.0+dfsg2/src/rcoo88.c:162:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %s",cdummy,CPANGO_FONT);
data/z88-13.0.0+dfsg2/src/rcoo88.c:164:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %s",cdummy,CPANGO_SIZE);
data/z88-13.0.0+dfsg2/src/rcoo88.c:185:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %lf",cdummy,&fycor);
data/z88-13.0.0+dfsg2/src/rcoo88.c:189:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f %f %f",cdummy,&f0,&f1,&f2,&f3);
data/z88-13.0.0+dfsg2/src/rcoo88.c:197:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %lf",cdummy,&fazoo);
data/z88-13.0.0+dfsg2/src/rcoo88.c:210:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f %f %f %f %f %f %f %f %f %f %f",
data/z88-13.0.0+dfsg2/src/rcoo88.c:227:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f %f %f %f %f %f %f %f %f %f %f",
data/z88-13.0.0+dfsg2/src/rcoo88.c:244:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f %f %f %f %f %f %f %f %f %f %f",
data/z88-13.0.0+dfsg2/src/rcoo88.c:270:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f %f %f",
data/z88-13.0.0+dfsg2/src/rcoo88.c:279:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f %f %f",
data/z88-13.0.0+dfsg2/src/rcoo88.c:288:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f %f %f",
data/z88-13.0.0+dfsg2/src/rcoo88.c:297:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f %f %f",
data/z88-13.0.0+dfsg2/src/rcoo88.c:315:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f %f %f",
data/z88-13.0.0+dfsg2/src/rcoo88.c:324:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f %f %f",
data/z88-13.0.0+dfsg2/src/rcoo88.c:333:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f %f %f",
data/z88-13.0.0+dfsg2/src/rcoo88.c:342:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f %f %f",
data/z88-13.0.0+dfsg2/src/rcoo88.c:360:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f %f %f",
data/z88-13.0.0+dfsg2/src/rcoo88.c:369:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f %f %f",
data/z88-13.0.0+dfsg2/src/rcoo88.c:387:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f %f %f",
data/z88-13.0.0+dfsg2/src/rcoo88.c:396:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f %f %f",
data/z88-13.0.0+dfsg2/src/rcoo88.c:405:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f",cdummy,&f0);
data/z88-13.0.0+dfsg2/src/rcoo88.c:419:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f %f",cdummy,&f0,&f1,&f2);
data/z88-13.0.0+dfsg2/src/rcoo88.c:426:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f",cdummy,&f0,&f1);
data/z88-13.0.0+dfsg2/src/rcoo88.c:432:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f",cdummy,&f0);
data/z88-13.0.0+dfsg2/src/rcoo88.c:446:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f %f",cdummy,&f0,&f1,&f2);
data/z88-13.0.0+dfsg2/src/rcoo88.c:453:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
              sscanf(cline,"%s %f %f %f",cdummy,&f0,&f1,&f2);
data/z88-13.0.0+dfsg2/src/rdy88h.c:109:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXGRA);
data/z88-13.0.0+dfsg2/src/rdy88h.c:111:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(cline,"%s %ld",cdummy,&MAXNDL);
data/z88-13.0.0+dfsg2/src/ri188.c:153:1:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDE,
data/z88-13.0.0+dfsg2/src/ri188.c:212:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PGB PGB PGE,
data/z88-13.0.0+dfsg2/src/ri188.c:221:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PGB PGE,
data/z88-13.0.0+dfsg2/src/ri188.c:250:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf(cline,PDB PDE,&idummy,&ityp[i]); 
data/z88-13.0.0+dfsg2/src/ri188.c:273:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDE,
data/z88-13.0.0+dfsg2/src/ri188.c:300:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDE,
data/z88-13.0.0+dfsg2/src/ri188.c:323:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PDB PDB PDB PDE,
data/z88-13.0.0+dfsg2/src/ri188.c:348:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PDE,
data/z88-13.0.0+dfsg2/src/ri188.c:372:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB\
data/z88-13.0.0+dfsg2/src/ri188.c:405:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDE,
data/z88-13.0.0+dfsg2/src/ri188.c:433:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDB PDE,
data/z88-13.0.0+dfsg2/src/ri188.c:460:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PDB PDE,
data/z88-13.0.0+dfsg2/src/ri188.c:484:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB\
data/z88-13.0.0+dfsg2/src/ri188.c:511:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PGB PGB PDB PGE,
data/z88-13.0.0+dfsg2/src/ri188.c:525:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PGB PGB PDB PGB PGE,
data/z88-13.0.0+dfsg2/src/ri188.c:538:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PGB PGB PDB PGB PGB PGB PGB PGB PGB PGE,
data/z88-13.0.0+dfsg2/src/ri188i.c:153:1:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDE,
data/z88-13.0.0+dfsg2/src/ri188i.c:212:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PGB PGB PGE,
data/z88-13.0.0+dfsg2/src/ri188i.c:221:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PGB PGE,
data/z88-13.0.0+dfsg2/src/ri188i.c:250:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf(cline,PDB PDE,&idummy,&ityp[i]); 
data/z88-13.0.0+dfsg2/src/ri188i.c:273:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDE,
data/z88-13.0.0+dfsg2/src/ri188i.c:300:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDE,
data/z88-13.0.0+dfsg2/src/ri188i.c:323:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PDB PDB PDB PDE,
data/z88-13.0.0+dfsg2/src/ri188i.c:348:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PDE,
data/z88-13.0.0+dfsg2/src/ri188i.c:372:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB\
data/z88-13.0.0+dfsg2/src/ri188i.c:405:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDE,
data/z88-13.0.0+dfsg2/src/ri188i.c:433:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDB PDE,
data/z88-13.0.0+dfsg2/src/ri188i.c:460:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PDB PDE,
data/z88-13.0.0+dfsg2/src/ri188i.c:484:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB\
data/z88-13.0.0+dfsg2/src/ri188i.c:511:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PGB PGB PDB PGE,
data/z88-13.0.0+dfsg2/src/ri188i.c:525:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PGB PGB PDB PGB PGE,
data/z88-13.0.0+dfsg2/src/ri188i.c:538:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PDB PDB PGB PGB PDB PGB PGB PGB PGB PGB PGB PGE,
data/z88-13.0.0+dfsg2/src/ri588.c:141:1:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
sscanf(cline,PD,&npr);
data/z88-13.0.0+dfsg2/src/ri588.c:156:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf(cline,PD,&nep[i]); 
data/z88-13.0.0+dfsg2/src/ri588.c:172:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG BPG BPD BPD BPD,&idummy,&pres[i],&tr1[i],
data/z88-13.0.0+dfsg2/src/ri588.c:186:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG BPD BPD BPD,&idummy,&pres[i],
data/z88-13.0.0+dfsg2/src/ri588.c:200:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG BPD BPD BPD BPD BPD BPD,
data/z88-13.0.0+dfsg2/src/ri588.c:217:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG BPG BPG BPD BPD BPD BPD BPD BPD BPD BPD,
data/z88-13.0.0+dfsg2/src/ri588.c:235:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG BPG BPG BPD BPD BPD BPD,
data/z88-13.0.0+dfsg2/src/ri588.c:251:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG BPG BPD BPD BPD BPD,
data/z88-13.0.0+dfsg2/src/ri588.c:264:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG,&idummy,&pres[i]); 
data/z88-13.0.0+dfsg2/src/ri588i.c:140:1:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
sscanf(cline,PD,&npr);
data/z88-13.0.0+dfsg2/src/ri588i.c:155:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf(cline,PD,&nep[i]); 
data/z88-13.0.0+dfsg2/src/ri588i.c:171:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG BPG BPD BPD BPD,&idummy,&pres[i],&tr1[i],
data/z88-13.0.0+dfsg2/src/ri588i.c:185:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG BPD BPD BPD,&idummy,&pres[i],
data/z88-13.0.0+dfsg2/src/ri588i.c:199:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG BPD BPD BPD BPD BPD BPD,
data/z88-13.0.0+dfsg2/src/ri588i.c:216:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG BPG BPG BPD BPD BPD BPD BPD BPD BPD BPD,
data/z88-13.0.0+dfsg2/src/ri588i.c:234:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG BPG BPG BPD BPD BPD BPD,
data/z88-13.0.0+dfsg2/src/ri588i.c:250:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG BPG BPD BPD BPD BPD,
data/z88-13.0.0+dfsg2/src/ri588i.c:263:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(cline,PD BPG,&idummy,&pres[i]); 
data/z88-13.0.0+dfsg2/src/wlog88d.c:107:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fwlo,"\nMAXKOI = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88d.c:112:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fwlo,"\nMAXK   = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88d.c:117:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fwlo,"\nMAXE   = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88d.c:122:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fwlo,"\nMAXNFG = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88d.c:127:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fwlo,"\nMAXNEG = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88e.c:111:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fwlo,"\nMAXKOI = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88e.c:116:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fwlo,"\nMAXK   = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88e.c:121:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fwlo,"\nMAXE   = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88e.c:126:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fwlo,"\nMAXNFG = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88e.c:131:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fwlo,"\nMAXNEG = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88e.c:136:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fwlo,"\nMAXESM = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88f.c:89:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 1) fprintf(fwlo,"\nSteuerflag CFLAG fuer Z88F ist -C, ICFLAG = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88f.c:90:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 2) fprintf(fwlo,"\nflag CFLAG for Z88F is -C, ICFLAG = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88f.c:95:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 1) fprintf(fwlo,"\nSteuerflag CFLAG fuer Z88F ist -T, ICFLAG = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88f.c:96:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 2) fprintf(fwlo,"\nflag CFLAG for Z88F is -T, ICFLAG = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88f.c:119:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fwlo,"\nMAXGS  = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88f.c:124:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fwlo,"\nMAXKOI = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88f.c:129:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fwlo,"\nMAXK   = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88f.c:134:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fwlo,"\nMAXE   = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88f.c:139:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fwlo,"\nMAXNFG = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88f.c:144:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fwlo,"\nMAXNEG = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88f.c:149:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fwlo,"\nMAXESM = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88f.c:465:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 1) fprintf(fwlo,"\nEinarbeiten der Randbedingungen Pass " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88f.c:466:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 2) fprintf(fwlo,"\nincorporating constraints pass " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i1.c:107:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fl1,"\nMAXKOI  = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i1.c:112:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fl1,"\nMAXIEZ  = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i1.c:117:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fl1,"\nMAXGS   = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i1.c:122:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fl1,"\nMAXK    = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i1.c:127:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fl1,"\nMAXE    = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i1.c:132:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fl1,"\nMAXNFG  = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i1.c:137:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fl1,"\nMAXNEG  = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i2.c:96:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 1) fprintf(fl2,"\nSteuerflag CFLAG fuer Z88I2 ist -C, ICFLAG = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i2.c:97:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 2) fprintf(fl2,"\nflag CFLAG for Z88I2 is -C, ICFLAG = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i2.c:102:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 1) fprintf(fl2,"\nSteuerflag CFLAG fuer Z88I2 ist -S, ICFLAG = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i2.c:103:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 2) fprintf(fl2,"\nflag CFLAG for Z88I2 is -S, ICFLAG = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i2.c:126:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fl2,"\nMAXKOI  = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i2.c:131:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fl2,"\nMAXGS   = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i2.c:136:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fl2,"\nMAXK    = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i2.c:141:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fl2,"\nMAXE    = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i2.c:146:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fl2,"\nMAXNFG  = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i2.c:151:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fl2,"\nMAXNEG  = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i2.c:156:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fl2,"\nMAXESM = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i2.c:161:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fl2,"\nMAXPR = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i2.c:388:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fl2,"\nMAXIT  = " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i2.c:393:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 1) fprintf(fl2,"\nEinarbeiten der Randbedingungen Pass " PD,i);
data/z88-13.0.0+dfsg2/src/wlog88i2.c:394:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 2) fprintf(fl2,"\nincorporating constraints pass " PD,i);
data/z88-13.0.0+dfsg2/src/wria88f.c:249:1:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
fprintf(fo0,
data/z88-13.0.0+dfsg2/src/wria88f.c:261:1:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
fprintf(fo0,
data/z88-13.0.0+dfsg2/src/wria88f.c:285:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(fo0,NLB PDB PD2B P13E P13E P13E,i,ifrei[i],x[i],y[i],z[i]);
data/z88-13.0.0+dfsg2/src/wria88f.c:315:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB PDB PDB NLE,
data/z88-13.0.0+dfsg2/src/wria88f.c:329:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB NLB PDB PDB NLE,i,ityp[i],
data/z88-13.0.0+dfsg2/src/wria88f.c:338:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB NLE,
data/z88-13.0.0+dfsg2/src/wria88f.c:350:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB NLE,
data/z88-13.0.0+dfsg2/src/wria88f.c:360:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB,
data/z88-13.0.0+dfsg2/src/wria88f.c:368:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,
data/z88-13.0.0+dfsg2/src/wria88f.c:382:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB,
data/z88-13.0.0+dfsg2/src/wria88f.c:388:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,PDB PDB PDB PDB PDB PDB NLE,
data/z88-13.0.0+dfsg2/src/wria88f.c:399:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB NLE,
data/z88-13.0.0+dfsg2/src/wria88f.c:413:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB NLE,i,ityp[i],
data/z88-13.0.0+dfsg2/src/wria88f.c:423:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB,
data/z88-13.0.0+dfsg2/src/wria88f.c:431:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,PDB PDB PDB PDB PDB PDB NLE,
data/z88-13.0.0+dfsg2/src/wria88f.c:455:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB B213E B213E B22D B513E,
data/z88-13.0.0+dfsg2/src/wria88f.c:473:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLE PDB PDB P13EB P11EB P2DB P13EB\
data/z88-13.0.0+dfsg2/src/wria88i.c:246:1:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
fprintf(fo0,
data/z88-13.0.0+dfsg2/src/wria88i.c:258:1:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
fprintf(fo0,
data/z88-13.0.0+dfsg2/src/wria88i.c:282:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(fo0,NLB PDB PD2B P13E P13E P13E,i,ifrei[i],x[i],y[i],z[i]);
data/z88-13.0.0+dfsg2/src/wria88i.c:313:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB PDB PDB NLE,
data/z88-13.0.0+dfsg2/src/wria88i.c:327:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB NLB PDB PDB NLE,i,ityp[i],
data/z88-13.0.0+dfsg2/src/wria88i.c:336:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB NLE,
data/z88-13.0.0+dfsg2/src/wria88i.c:348:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB NLE,
data/z88-13.0.0+dfsg2/src/wria88i.c:358:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB,
data/z88-13.0.0+dfsg2/src/wria88i.c:366:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,
data/z88-13.0.0+dfsg2/src/wria88i.c:380:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB,
data/z88-13.0.0+dfsg2/src/wria88i.c:386:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,PDB PDB PDB PDB PDB PDB NLE,
data/z88-13.0.0+dfsg2/src/wria88i.c:397:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB NLE,
data/z88-13.0.0+dfsg2/src/wria88i.c:411:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB NLE,i,ityp[i],
data/z88-13.0.0+dfsg2/src/wria88i.c:421:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB,
data/z88-13.0.0+dfsg2/src/wria88i.c:429:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,PDB PDB PDB PDB PDB PDB NLE,
data/z88-13.0.0+dfsg2/src/wria88i.c:453:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLB PDB PDB B213E B213E B22D B513E,
data/z88-13.0.0+dfsg2/src/wria88i.c:471:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo0,NLE PDB PDB P13EB P11EB P2DB P13EB\
data/z88-13.0.0+dfsg2/src/wrim88e.c:102:15:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
if(LANG == 1) printf("\rNr. " P5D " Typ " P5D,k,i);
data/z88-13.0.0+dfsg2/src/wrim88e.c:103:15:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
if(LANG == 2) printf("\rno. " P5D " type " P5D,k,i);
data/z88-13.0.0+dfsg2/src/wrim88f.c:88:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf("\r" PD,i);
data/z88-13.0.0+dfsg2/src/wrim88f.c:92:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 1) printf("\rElement " PD,i);
data/z88-13.0.0+dfsg2/src/wrim88f.c:93:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 2) printf("\relement " PD,i);
data/z88-13.0.0+dfsg2/src/wrim88f.c:97:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 1) printf(PD " x " PD " = Groesse Gleichungsystem \n",i,i);
data/z88-13.0.0+dfsg2/src/wrim88f.c:98:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 2) printf(PD " x " PD " = size of system of equations\n",i,i);
data/z88-13.0.0+dfsg2/src/wrim88f.c:255:15:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
if(LANG == 1) printf("\rNr. " P5D " Typ " P5D,k,i);
data/z88-13.0.0+dfsg2/src/wrim88f.c:256:15:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
if(LANG == 2) printf("\rno. " P5D " type " P5D,k,i);
data/z88-13.0.0+dfsg2/src/wrim88i.c:92:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf("\r" PD,i);
data/z88-13.0.0+dfsg2/src/wrim88i.c:96:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 1) printf("\rElement " PD,i);
data/z88-13.0.0+dfsg2/src/wrim88i.c:97:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 2) printf("\relement " PD,i);
data/z88-13.0.0+dfsg2/src/wrim88i.c:101:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 1) printf(PD " x " PD " = Groesse Gleichungsystem \n",i,i);
data/z88-13.0.0+dfsg2/src/wrim88i.c:102:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 2) printf(PD " x " PD " = size of system of equations\n",i,i);
data/z88-13.0.0+dfsg2/src/wrim88i.c:275:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 1) printf("\rpartielle Cholesky- Zerlegung Nr." PD,i);
data/z88-13.0.0+dfsg2/src/wrim88i.c:276:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if(LANG == 2) printf("\rincomplete Cholesky decomposition no." PD,i);
data/z88-13.0.0+dfsg2/src/wrim88i.c:389:15:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
if(LANG == 1) printf("\rnoch " PD9 " Schritte, Pointer IEZ = " PD9,k,i);
data/z88-13.0.0+dfsg2/src/wrim88i.c:390:15:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
if(LANG == 2) printf("\rstill " PD9 " steps, pointer IEZ = " PD9,k,i);
data/z88-13.0.0+dfsg2/src/wrim88i.c:402:15:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
if(LANG == 1) printf("\rRandbedingung Nr. " PD " Typ " PD,k,i);
data/z88-13.0.0+dfsg2/src/wrim88i.c:403:15:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
if(LANG == 2) printf("\rconstraint no. " PD " type " PD,k,i);
data/z88-13.0.0+dfsg2/src/z88cc.c:192:1:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
sscanf(cline,PD,&nrb);
data/z88-13.0.0+dfsg2/src/z88cc.c:198:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf(cline,PDB PDB PDB PG,&nkn,&ifg,&iflag1,&wert);
data/z88-13.0.0+dfsg2/src/z88cc.c:286:1:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
sscanf(cline,PD,&nrb);
data/z88-13.0.0+dfsg2/src/z88cc.c:305:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf(cline,PDB PDB PDB PG,&nkn,&ifg,&iflag1,&wert);
data/z88-13.0.0+dfsg2/src/z88cc.c:313:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo1, "Knoten#" B5D "   FG" B1D "   Steuerflag" B1D "   Last         " P15E NL,
data/z88-13.0.0+dfsg2/src/z88cc.c:317:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo1, "  node#" B5D "   DOF" B1D "  lo/di flag" B1D "   load         " P15E NL,
data/z88-13.0.0+dfsg2/src/z88cc.c:324:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo1, "Knoten#" B5D "   FG" B1D "   Steuerflag" B1D "   Verschiebung " P15E NL,
data/z88-13.0.0+dfsg2/src/z88cc.c:328:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo1,"  node#" B5D "   DOF" B1D "  lo/di flag" B1D "   displacement " P15E NL,
data/z88-13.0.0+dfsg2/src/z88cc.c:415:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo2,NL B5D B315E B315E,i,rs[k],rs[k+1]);
data/z88-13.0.0+dfsg2/src/z88cc.c:424:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo2,NL B5D B315E B315E B315E,i,rs[k],rs[k+1],rs[k+2]);
data/z88-13.0.0+dfsg2/src/z88cc.c:433:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo2,NL B5D B315E B315E B315E B315E B315E B315E,
data/z88-13.0.0+dfsg2/src/z88ci.c:205:1:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
sscanf(cline,PDB PF PF PF,&maxit,&eps,&rpalpha,&rpomega);
data/z88-13.0.0+dfsg2/src/z88ci.c:219:1:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
sscanf(cline,PD,&nrb);
data/z88-13.0.0+dfsg2/src/z88ci.c:225:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf(cline,PDB PDB PDB PG,&nkn,&ifg,&iflag1,&wert);
data/z88-13.0.0+dfsg2/src/z88ci.c:317:1:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
sscanf(cline,PD,&nrb);
data/z88-13.0.0+dfsg2/src/z88ci.c:336:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf(cline,PDB PDB PDB PG,&nkn,&ifg,&iflag1,&wert);
data/z88-13.0.0+dfsg2/src/z88ci.c:344:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo1, "Knoten#" B5D "   FG" B1D "   Steuerflag" B1D "   Last         " P15E NL,
data/z88-13.0.0+dfsg2/src/z88ci.c:348:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo1, "  node#" B5D "   DOF" B1D "  lo/di flag" B1D "   load         " P15E NL,
data/z88-13.0.0+dfsg2/src/z88ci.c:355:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo1, "Knoten#" B5D "   FG" B1D "   Steuerflag" B1D "   Verschiebung " P15E NL,
data/z88-13.0.0+dfsg2/src/z88ci.c:359:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo1,"  node#" B5D "   DOF" B1D "  lo/di flag" B1D "   displacement " P15E NL,
data/z88-13.0.0+dfsg2/src/z88ci.c:461:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo2,NL B5D B315E B315E,i,rs[k],rs[k+1]);
data/z88-13.0.0+dfsg2/src/z88ci.c:470:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo2,NL B5D B315E B315E B315E,i,rs[k],rs[k+1],rs[k+2]);
data/z88-13.0.0+dfsg2/src/z88ci.c:479:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo2,NL B5D B315E B315E B315E B315E B315E B315E,
data/z88-13.0.0+dfsg2/src/z88d.c:292:1:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
sscanf(cline,PDB PDB PD,&ninto,&kflag,&isflag);
data/z88-13.0.0+dfsg2/src/z88d.c:312:1:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
fprintf(fo5,BP5D BP5D BP5D,ndim,ninto,isflag);
data/z88-13.0.0+dfsg2/src/z88d.c:505:15:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
if(LANG == 1) fprintf(fo3,"\n\nElement #= " P5D " Typ =RBalken\
data/z88-13.0.0+dfsg2/src/z88d.c:507:15:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
if(LANG == 2) fprintf(fo3,"\n\nelement #= " P5D " type =spbeam\
data/z88-13.0.0+dfsg2/src/z88d.c:650:15:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
if(LANG == 1) fprintf(fo3,"\n\nElement #= " P5D " Typ = Welle\
data/z88-13.0.0+dfsg2/src/z88d.c:652:15:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
if(LANG == 2) fprintf(fo3,"\n\nelement #= " P5D " type = shaft\
data/z88-13.0.0+dfsg2/src/z88d.c:1067:20:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
     if(LANG == 1) fprintf(fo3,"\n\nElement #= " P5D " Typ= Balken in Ebene\
data/z88-13.0.0+dfsg2/src/z88d.c:1070:20:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
     if(LANG == 2) fprintf(fo3,"\n\nelement #= " P5D " type = beam in plane\
data/z88-13.0.0+dfsg2/src/z88d.c:1535:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(fo8," " PDB PD,janz,isflag);
data/z88-13.0.0+dfsg2/src/z88d.c:1545:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo8,NL P7DB P7DB P11E,k,jsm[k],smw[k]);
data/z88-13.0.0+dfsg2/src/z88d.c:1552:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(fo8,NL " " PD,ne);
data/z88-13.0.0+dfsg2/src/z88d.c:1558:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fo8,NL P7DB P11E,k,gmw[k]);
data/z88-13.0.0+dfsg2/src/z88e.c:409:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo4,NL P5DB B213E B213E B213E,
data/z88-13.0.0+dfsg2/src/z88e.c:476:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo4,NL P5DB B213E B213E B213E B213E B213E B213E,
data/z88-13.0.0+dfsg2/src/z88e.c:552:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo4,NL P5DB B213E B213E,
data/z88-13.0.0+dfsg2/src/z88e.c:616:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo4,NL P5DB B213E B213E B213E,
data/z88-13.0.0+dfsg2/src/z88e.c:679:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo4,NL P5DB B213E B213E B213E B213E B213E B213E,
data/z88-13.0.0+dfsg2/src/z88e.c:748:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo4,NL P5DB B213E B213E,
data/z88-13.0.0+dfsg2/src/z88e.c:843:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo4,NL P5DB B213E B213E,
data/z88-13.0.0+dfsg2/src/z88e.c:905:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo4,NL P5DB B213E B213E,
data/z88-13.0.0+dfsg2/src/z88e.c:976:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo4,NL P5DB B213E B213E B213E,
data/z88-13.0.0+dfsg2/src/z88e.c:1072:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo4,NL P5DB B213E B213E,
data/z88-13.0.0+dfsg2/src/z88e.c:1134:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo4,NL P5DB B213E B213E B213E,
data/z88-13.0.0+dfsg2/src/z88e.c:1230:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo4,NL P5DB B213E B213E,
data/z88-13.0.0+dfsg2/src/z88e.c:1301:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo4,NL P5DB B213E B213E B213E,
data/z88-13.0.0+dfsg2/src/z88e.c:1373:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo4,NL P5DB B213E B213E B213E,
data/z88-13.0.0+dfsg2/src/z88e.c:1444:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo4,NL P5DB B213E B213E B213E,
data/z88-13.0.0+dfsg2/src/z88e.c:1515:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo4,NL P5DB B213E B213E B213E,
data/z88-13.0.0+dfsg2/src/z88e.c:1586:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fo4,NL P5DB B213E B213E B213E,
data/z88-13.0.0+dfsg2/src/z88e.c:1633:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(fo4,P5DB B213E B213E B213E B213E B213E B213E NL,
data/z88-13.0.0+dfsg2/src/z88f.c:207:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy(cflagul,argv[1]);  
data/z88-13.0.0+dfsg2/src/z88fx.c:227:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cline,"%s %ld %ld %ld %ld %ld %ld %ld %ld %ld",
data/z88-13.0.0+dfsg2/src/z88fx.c:238:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cline,"%s %ld %ld %ld %ld %ld %ld %ld %ld %ld %ld",
data/z88-13.0.0+dfsg2/src/z88fx.c:384:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cline,"%s %ld",ctext,&k);             /* k lesen */
data/z88-13.0.0+dfsg2/src/z88fx.c:439:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cline,"%s %ld",ctext,&k);
data/z88-13.0.0+dfsg2/src/z88fx.c:440:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cline,"%s %ld %ld",ctext,&idummy,&ityp[k]);
data/z88-13.0.0+dfsg2/src/z88fx.c:451:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        sscanf(cline,"%s %ld %ld %ld %ld %c %ld %c %ld %c",
data/z88-13.0.0+dfsg2/src/z88fx.c:460:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        sscanf(cline,"%s %ld %ld %ld %ld %c %ld %c",
data/z88-13.0.0+dfsg2/src/z88fx.c:591:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(cline,"%s %ld",ctext,&j);
data/z88-13.0.0+dfsg2/src/z88fx.c:594:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      sscanf(cline,"%s %ld %ld %ld %lg %lg %ld %lg",ctext,&idummy,
data/z88-13.0.0+dfsg2/src/z88fx.c:603:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      sscanf(cline,
data/z88-13.0.0+dfsg2/src/z88fx.c:648:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      sscanf(cline,"%s %ld",ctext,&nrb);
data/z88-13.0.0+dfsg2/src/z88fx.c:682:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      sscanf(cline,"%s %ld",ctext,&j);
data/z88-13.0.0+dfsg2/src/z88fx.c:683:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      sscanf(cline,"%s %ld %ld %ld %ld %lg",
data/z88-13.0.0+dfsg2/src/z88fx.c:723:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      sscanf(cline,"%s %ld",ctext,&npr);
data/z88-13.0.0+dfsg2/src/z88fx.c:757:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      sscanf(cline,"%s %ld",ctext,&j);
data/z88-13.0.0+dfsg2/src/z88fx.c:758:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      sscanf(cline,"%s %ld %ld",ctext,&idummy,&nep[j]);
data/z88-13.0.0+dfsg2/src/z88fx.c:776:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        sscanf(cline,"%s %ld %ld %lf %lf %ld %ld %ld",
data/z88-13.0.0+dfsg2/src/z88fx.c:804:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        sscanf(cline,"%s %ld %ld %lf %lf %lf %ld %ld %ld %ld %ld %ld %ld %ld",
data/z88-13.0.0+dfsg2/src/z88fx.c:838:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        sscanf(cline,"%s %ld %ld %lf %lf %lf %ld %ld %ld %ld",
data/z88-13.0.0+dfsg2/src/z88fx.c:868:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        sscanf(cline,"%s %ld %ld %lf %lf %ld %ld %ld %ld",
data/z88-13.0.0+dfsg2/src/z88fx.c:888:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        sscanf(cline,"%s %ld %ld %lf",ctext,&idummy,&jdummy,&pres[j]); 
data/z88-13.0.0+dfsg2/src/z88fx.c:926:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      sscanf(cline,"%s %ld %ld %ld",ctext,&ninto,&ksflag,&isflag);
data/z88-13.0.0+dfsg2/src/z88i2.c:216:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy(cflagul,argv[1]);  
data/z88-13.0.0+dfsg2/src/z88o.c:393:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy(CF_GRAFICS,CPANGO_FONT);
data/z88-13.0.0+dfsg2/src/z88o.c:395:1:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
strcat(CF_GRAFICS,CPANGO_SIZE);
data/z88-13.0.0+dfsg2/src/z88x.c:197:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy(cflagul,argv[1]);  
data/z88-13.0.0+dfsg2/src/z88x.c:229:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cftexts,argv[2]);  
data/z88-13.0.0+dfsg2/src/ale88c.c:61:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char              cmess[256];
data/z88-13.0.0+dfsg2/src/ale88c.c:66:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Browser nicht starten!\nEinstellungen in Z88.FCD pruefen.");
data/z88-13.0.0+dfsg2/src/ale88c.c:67:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot launch Browser!\nCheck your entries in Z88.FCD.");
data/z88-13.0.0+dfsg2/src/ale88c.c:71:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88COM.LOG nicht oeffnen!");
data/z88-13.0.0+dfsg2/src/ale88c.c:72:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot open Z88COM.LOG!");
data/z88-13.0.0+dfsg2/src/ale88c.c:76:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88.DYN oder Editor nicht oeffnen!\nZ88.FCD pruefen.");
data/z88-13.0.0+dfsg2/src/ale88c.c:77:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot open Z88.DYN or Editor!\nCheck Z88.FCD");
data/z88-13.0.0+dfsg2/src/ale88c.c:81:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88.FCD oder Editor nicht oeffnen!\nZ88.FCD pruefen.");
data/z88-13.0.0+dfsg2/src/ale88c.c:82:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot open Z88.FCD or Editor!\nCheck Z88.FCD");
data/z88-13.0.0+dfsg2/src/ale88c.c:86:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Z88.DYN ist falsch!");
data/z88-13.0.0+dfsg2/src/ale88c.c:87:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Z88.DYN is  wrong!");
data/z88-13.0.0+dfsg2/src/ale88c.c:91:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88NI.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen.");
data/z88-13.0.0+dfsg2/src/ale88c.c:92:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot open Z88NI.TXT or Editor!\nCheck Z88.FCD");
data/z88-13.0.0+dfsg2/src/ale88c.c:96:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88I1.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen.");
data/z88-13.0.0+dfsg2/src/ale88c.c:97:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot open Z88I1.TXT or Editor!\nCheck Z88.FCD");
data/z88-13.0.0+dfsg2/src/ale88c.c:101:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88I2.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen.");
data/z88-13.0.0+dfsg2/src/ale88c.c:102:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot open Z88I2.TXT or Editor!\nCheck Z88.FCD");
data/z88-13.0.0+dfsg2/src/ale88c.c:106:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88I3.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen.");
data/z88-13.0.0+dfsg2/src/ale88c.c:107:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot open Z88I3.TXT or Editor!\nCheck Z88.FCD");
data/z88-13.0.0+dfsg2/src/ale88c.c:111:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88I4.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen.");
data/z88-13.0.0+dfsg2/src/ale88c.c:112:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot open Z88I4.TXT or Editor!\nCheck Z88.FCD");
data/z88-13.0.0+dfsg2/src/ale88c.c:116:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88I5.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen.");
data/z88-13.0.0+dfsg2/src/ale88c.c:117:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot open Z88I5.TXT or Editor!\nCheck Z88.FCD");
data/z88-13.0.0+dfsg2/src/ale88c.c:121:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88O0.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen.");
data/z88-13.0.0+dfsg2/src/ale88c.c:122:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot open Z88O0.TXT or Editor!\nCheck Z88.FCD");
data/z88-13.0.0+dfsg2/src/ale88c.c:126:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88O1.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen.");
data/z88-13.0.0+dfsg2/src/ale88c.c:127:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot open Z88O1.TXT or Editor!\nCheck Z88.FCD");
data/z88-13.0.0+dfsg2/src/ale88c.c:131:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88O2.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen.");
data/z88-13.0.0+dfsg2/src/ale88c.c:132:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot open Z88O2.TXT or Editor!\nCheck Z88.FCD");
data/z88-13.0.0+dfsg2/src/ale88c.c:136:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88O3.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen.");
data/z88-13.0.0+dfsg2/src/ale88c.c:137:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot open Z88O3.TXT or Editor!\nCheck Z88.FCD");
data/z88-13.0.0+dfsg2/src/ale88c.c:141:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88O4.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen.");
data/z88-13.0.0+dfsg2/src/ale88c.c:142:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot open Z88O4.TXT or Editor!\nCheck Z88.FCD");
data/z88-13.0.0+dfsg2/src/ale88c.c:146:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88F nicht starten!");
data/z88-13.0.0+dfsg2/src/ale88c.c:147:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot launch Z88F!");
data/z88-13.0.0+dfsg2/src/ale88c.c:151:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88E nicht starten!");
data/z88-13.0.0+dfsg2/src/ale88c.c:152:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot launch Z88E!");
data/z88-13.0.0+dfsg2/src/ale88c.c:156:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88D nicht starten!");
data/z88-13.0.0+dfsg2/src/ale88c.c:157:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot launch Z88D!");
data/z88-13.0.0+dfsg2/src/ale88c.c:161:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88I1 nicht starten!");
data/z88-13.0.0+dfsg2/src/ale88c.c:162:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot launch Z88I1!");
data/z88-13.0.0+dfsg2/src/ale88c.c:166:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88I2 nicht starten!");
data/z88-13.0.0+dfsg2/src/ale88c.c:167:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot launch Z88I2!");
data/z88-13.0.0+dfsg2/src/ale88c.c:171:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88PAR nicht starten!");
data/z88-13.0.0+dfsg2/src/ale88c.c:172:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot launch Z88PAR!");
data/z88-13.0.0+dfsg2/src/ale88c.c:176:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88X nicht starten!");
data/z88-13.0.0+dfsg2/src/ale88c.c:177:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot launch Z88X!");
data/z88-13.0.0+dfsg2/src/ale88c.c:181:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88G nicht starten!");
data/z88-13.0.0+dfsg2/src/ale88c.c:182:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot launch Z88G!");
data/z88-13.0.0+dfsg2/src/ale88c.c:186:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88H nicht starten!");
data/z88-13.0.0+dfsg2/src/ale88c.c:187:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot launch Z88H!");
data/z88-13.0.0+dfsg2/src/ale88c.c:191:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88V nicht starten!");
data/z88-13.0.0+dfsg2/src/ale88c.c:192:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot launch Z88V!");
data/z88-13.0.0+dfsg2/src/ale88c.c:196:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88O nicht starten!");
data/z88-13.0.0+dfsg2/src/ale88c.c:197:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot launch Z88O!");
data/z88-13.0.0+dfsg2/src/ale88o.c:64:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char              cmess[256];
data/z88-13.0.0+dfsg2/src/ale88o.c:66:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cmess,"Unbekannten Fehler endeckt!");
data/z88-13.0.0+dfsg2/src/ale88o.c:67:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cmess,"Unknown Error detected!");
data/z88-13.0.0+dfsg2/src/ale88o.c:72:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Browser nicht starten!\nEinstellungen in Z88.FCD pruefen.");
data/z88-13.0.0+dfsg2/src/ale88o.c:73:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot launch Browser!\nCheck your entries in Z88.FCD.");
data/z88-13.0.0+dfsg2/src/ale88o.c:78:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88O.LOG nicht oeffnen!");
data/z88-13.0.0+dfsg2/src/ale88o.c:79:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot open Z88O.LOG!");
data/z88-13.0.0+dfsg2/src/ale88o.c:84:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Z88.DYN nicht oeffnen!");
data/z88-13.0.0+dfsg2/src/ale88o.c:85:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot open Z88.DYN!");
data/z88-13.0.0+dfsg2/src/ale88o.c:90:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Z88.DYN ist falsch!");
data/z88-13.0.0+dfsg2/src/ale88o.c:91:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Z88.DYN is  wrong!");
data/z88-13.0.0+dfsg2/src/ale88o.c:96:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Nicht genug dynamischer Speicher!\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:98:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Dynamic memory exhausted!\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:104:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Strukturfile nicht gefunden!\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:106:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Structure file not found!\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:112:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Z88I2.TXT nicht gefunden!\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:114:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Z88I2.TXT not found!\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:120:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Z88I5.TXT nicht gefunden!\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:122:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Z88I5.TXT not found!\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:128:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Z88O2.TXT nicht gefunden!\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:131:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Z88O2.TXT not found!\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:140:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Z88O5.TXT nicht gefunden!\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:143:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Z88O5.TXT not found !\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:151:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Z88O8.TXT nicht gefunden!\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:154:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Z88O8.TXT not found !\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:162:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Integrationsordnung 0! Abhilfe: NINT > 0 in Z88I3.TXT, Z88D starten");
data/z88-13.0.0+dfsg2/src/ale88o.c:163:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"integration order 0! Recover: NINT > 0 in Z88I3.TXT, run Z88D again");
data/z88-13.0.0+dfsg2/src/ale88o.c:169:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Integrationsordnung ist nicht Null! Neuer Lauf Z88D mit NINT=0 in Z88I3.TXT.");
data/z88-13.0.0+dfsg2/src/ale88o.c:170:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Integration constant is not Zero! Run Z88D again, enter NINT=0 in Z88I3.TXT .");
data/z88-13.0.0+dfsg2/src/ale88o.c:176:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Speicher fuer Knoten ueberschritten ! STOP !\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:178:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Memory for nodes exhausted ! STOP !\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:184:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Speicher fuer Koinzidenzvektor ueberschritten ! STOP !\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:186:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Memory for coincidence vector exhausted ! STOP\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:192:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Speicher fuer Elemente ueberschritten !\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:194:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Memory for elements exhausted ! STOP !\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:200:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"zuviele Gausspunkte! STOP ! Abhilfe: MAXGP in Z88.DYN erhoehen");
data/z88-13.0.0+dfsg2/src/ale88o.c:201:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"too many Gauss points! STOP ! Recover: increase MAXGP in Z88.DYN");
data/z88-13.0.0+dfsg2/src/ale88o.c:206:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Speicher fuer Drucklasten ueberschritten! STOP ! Abhilfe: MAXPR in Z88.DYN erhoehen.");
data/z88-13.0.0+dfsg2/src/ale88o.c:207:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Memory for pressure loads exhausted! STOP ! Recover: increase MAXPR in Z88.DYN.");
data/z88-13.0.0+dfsg2/src/ale88o.c:212:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Speicher fuer Randbedingungen ueberschritten! STOP ! Abhilfe: MAXRBD in Z88.DYN erhoehen.");
data/z88-13.0.0+dfsg2/src/ale88o.c:213:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Memory for boundary conditions exhausted! STOP ! Recover: increase MAXRBD in Z88.DYN .");
data/z88-13.0.0+dfsg2/src/ale88o.c:218:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Falsche Dimension im Structurfile ! STOP !\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:220:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Wrong dimension in structur file ! STOP !\n\
data/z88-13.0.0+dfsg2/src/ale88o.c:226:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann GLX-Grafikkontext nicht oeffnen ! STOP !");
data/z88-13.0.0+dfsg2/src/ale88o.c:227:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot open GLX Grafics Context ! STOP !");
data/z88-13.0.0+dfsg2/src/ale88o.c:232:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 1) strcpy(cmess,"Kann Pango-Font nicht oeffnen ! STOP !");
data/z88-13.0.0+dfsg2/src/ale88o.c:233:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if(LANG == 2) strcpy(cmess,"Cannot open Pango Font! STOP !");
data/z88-13.0.0+dfsg2/src/cb88c.c:72:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:77:15:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
if(LANG == 1) strcat(command,"g88ix.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:78:15:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
if(LANG == 2) strcat(command,"e88ix.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:94:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cmess[512],cbytes[128];
data/z88-13.0.0+dfsg2/src/cb88c.c:96:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cmess,
data/z88-13.0.0+dfsg2/src/cb88c.c:99:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cmess,
data/z88-13.0.0+dfsg2/src/cb88c.c:104:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(cbytes,"Floats: %d Bytes\n",(int)sizeof(long double)); 
data/z88-13.0.0+dfsg2/src/cb88c.c:108:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(cbytes,"Floats: %d Bytes\n",(int)sizeof(double));  
data/z88-13.0.0+dfsg2/src/cb88c.c:112:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(cbytes,"Integers: %d Bytes\n",(int)sizeof(int)); 
data/z88-13.0.0+dfsg2/src/cb88c.c:116:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(cbytes,"Integers: %d Bytes\n",(int)sizeof(long));  
data/z88-13.0.0+dfsg2/src/cb88c.c:120:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(cbytes,"Integers: %d Bytes\n",(int)sizeof(long long));
data/z88-13.0.0+dfsg2/src/cb88c.c:123:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(cbytes,"Pointers: %d Bytes\n",(int)sizeof(pp));     
data/z88-13.0.0+dfsg2/src/cb88c.c:173:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:185:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88v.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:186:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88v.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:201:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:213:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88n.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:214:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88n.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:229:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:241:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88d.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:242:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88d.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:257:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:269:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88e.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:270:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88e.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:285:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:297:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88g.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:298:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88g.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:313:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:325:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88h.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:326:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88h.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:341:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:353:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88o.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:354:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88o.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:369:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:374:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(command," z88.dyn");
data/z88-13.0.0+dfsg2/src/cb88c.c:383:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88dy.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:384:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88dy.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:399:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:404:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(command," z88.fcd");
data/z88-13.0.0+dfsg2/src/cb88c.c:423:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88mr.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:424:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88mr.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:439:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:444:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(command," z88ni.txt");
data/z88-13.0.0+dfsg2/src/cb88c.c:453:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88ni.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:454:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88ni.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:469:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:474:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(command," z88i1.txt");
data/z88-13.0.0+dfsg2/src/cb88c.c:483:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88i1.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:484:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88i1.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:499:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:504:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(command," z88i2.txt");
data/z88-13.0.0+dfsg2/src/cb88c.c:513:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88i2.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:514:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88i2.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:529:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:534:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(command," z88i3.txt");
data/z88-13.0.0+dfsg2/src/cb88c.c:543:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88i3.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:544:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88i3.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:559:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:564:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(command," z88i4.txt");
data/z88-13.0.0+dfsg2/src/cb88c.c:573:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88i4.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:574:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88i4.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:589:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:594:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(command," z88i5.txt");
data/z88-13.0.0+dfsg2/src/cb88c.c:603:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88i5.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:604:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88i5.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:619:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:624:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(command," z88o0.txt");
data/z88-13.0.0+dfsg2/src/cb88c.c:633:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88ix.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:634:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88ix.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:649:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:654:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(command," z88o1.txt");
data/z88-13.0.0+dfsg2/src/cb88c.c:663:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88ix.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:664:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88ix.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:679:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:684:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(command," z88o2.txt");
data/z88-13.0.0+dfsg2/src/cb88c.c:693:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88ix.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:694:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88ix.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:709:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:714:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(command," z88o3.txt");
data/z88-13.0.0+dfsg2/src/cb88c.c:723:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88ix.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:724:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88ix.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:739:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:744:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(command," z88o4.txt");
data/z88-13.0.0+dfsg2/src/cb88c.c:753:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88ix.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:754:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88ix.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:769:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:781:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88x.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:782:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88x.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:797:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:809:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88x.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:810:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88x.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:825:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:837:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88x.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:838:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88x.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:853:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:865:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88x.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:866:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88x.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:881:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:893:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88x.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:894:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88x.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:909:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:921:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88x.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:922:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88x.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:937:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:949:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88f.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:950:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88f.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:965:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:977:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88f.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:978:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88f.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:993:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:1005:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88ite.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:1006:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88ite.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:1021:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:1033:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88ite.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:1034:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88ite.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:1049:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:1061:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88ite.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:1062:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88ite.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:1077:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88c.c:1089:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 1) strcat(command,"g88ite.htm");
data/z88-13.0.0+dfsg2/src/cb88c.c:1090:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if(LANG == 2) strcat(command,"e88ite.htm");
data/z88-13.0.0+dfsg2/src/cb88o.c:350:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cmess,"Z88O V13.0 fuer UNIX/LINUX\n\
data/z88-13.0.0+dfsg2/src/cb88o.c:353:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cmess,"Z88O V13.0 for UNIX/LINUX\n\
data/z88-13.0.0+dfsg2/src/cb88o.c:358:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(cbytes,"Floats: %d Bytes\n",(int)sizeof(long double)); 
data/z88-13.0.0+dfsg2/src/cb88o.c:362:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(cbytes,"Floats: %d Bytes\n",(int)sizeof(double));  
data/z88-13.0.0+dfsg2/src/cb88o.c:366:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(cbytes,"Integers: %d Bytes\n",(int)sizeof(int)); 
data/z88-13.0.0+dfsg2/src/cb88o.c:370:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(cbytes,"Integers: %d Bytes\n",(int)sizeof(long));  
data/z88-13.0.0+dfsg2/src/cb88o.c:374:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(cbytes,"Integers: %d Bytes\n",(int)sizeof(long long));
data/z88-13.0.0+dfsg2/src/cb88o.c:377:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(cbytes,"Pointers: %d Bytes\n",(int)sizeof(pp));     
data/z88-13.0.0+dfsg2/src/cb88o.c:395:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char command[320];
data/z88-13.0.0+dfsg2/src/cb88o.c:400:15:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
if(LANG == 1) strcat(command,"g88o.htm");
data/z88-13.0.0+dfsg2/src/cb88o.c:401:15:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
if(LANG == 2) strcat(command,"e88o.htm");
data/z88-13.0.0+dfsg2/src/cb88o.c:430:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fi1= fopen(cstrn,"r");
data/z88-13.0.0+dfsg2/src/cb88o.c:514:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cstring[80];
data/z88-13.0.0+dfsg2/src/cb88o.c:519:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"* Maus / Tastatur");
data/z88-13.0.0+dfsg2/src/cb88o.c:520:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"* Mouse / Keyboard");
data/z88-13.0.0+dfsg2/src/cb88o.c:526:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"* Tastatur / Maus");
data/z88-13.0.0+dfsg2/src/cb88o.c:527:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"* Keyboard / Mouse");
data/z88-13.0.0+dfsg2/src/cb88o.c:540:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char             cstring[80];
data/z88-13.0.0+dfsg2/src/cb88o.c:544:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"* unverformt");
data/z88-13.0.0+dfsg2/src/cb88o.c:545:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"* undeflected");
data/z88-13.0.0+dfsg2/src/cb88o.c:547:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"verformt");
data/z88-13.0.0+dfsg2/src/cb88o.c:548:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"deflected");
data/z88-13.0.0+dfsg2/src/cb88o.c:562:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char             cstring[80];
data/z88-13.0.0+dfsg2/src/cb88o.c:566:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"unverformt");
data/z88-13.0.0+dfsg2/src/cb88o.c:567:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"undeflected");
data/z88-13.0.0+dfsg2/src/cb88o.c:569:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"* verformt");
data/z88-13.0.0+dfsg2/src/cb88o.c:570:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"* deflected");
data/z88-13.0.0+dfsg2/src/cb88o.c:585:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char             cstring[80];
data/z88-13.0.0+dfsg2/src/cb88o.c:589:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"* Licht");
data/z88-13.0.0+dfsg2/src/cb88o.c:590:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"* Light");
data/z88-13.0.0+dfsg2/src/cb88o.c:592:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(cstring,"Hidden Line");
data/z88-13.0.0+dfsg2/src/cb88o.c:594:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(cstring,"Wireframe");
data/z88-13.0.0+dfsg2/src/cb88o.c:596:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen Eckknoten");
data/z88-13.0.0+dfsg2/src/cb88o.c:597:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses Corner Nodes");
data/z88-13.0.0+dfsg2/src/cb88o.c:599:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen pro Element");
data/z88-13.0.0+dfsg2/src/cb88o.c:600:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses per Element");
data/z88-13.0.0+dfsg2/src/cb88o.c:602:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen Gausspunkte");
data/z88-13.0.0+dfsg2/src/cb88o.c:603:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses Gauss Points");
data/z88-13.0.0+dfsg2/src/cb88o.c:605:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen X");
data/z88-13.0.0+dfsg2/src/cb88o.c:606:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections X");
data/z88-13.0.0+dfsg2/src/cb88o.c:608:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen Y");
data/z88-13.0.0+dfsg2/src/cb88o.c:609:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections Y");
data/z88-13.0.0+dfsg2/src/cb88o.c:611:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen Z");
data/z88-13.0.0+dfsg2/src/cb88o.c:612:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections Z");
data/z88-13.0.0+dfsg2/src/cb88o.c:627:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char             cstring[80];
data/z88-13.0.0+dfsg2/src/cb88o.c:631:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Licht");
data/z88-13.0.0+dfsg2/src/cb88o.c:632:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Light");
data/z88-13.0.0+dfsg2/src/cb88o.c:634:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(cstring,"* Hidden Line");
data/z88-13.0.0+dfsg2/src/cb88o.c:636:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(cstring,"Wireframe");
data/z88-13.0.0+dfsg2/src/cb88o.c:638:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen Eckknoten");
data/z88-13.0.0+dfsg2/src/cb88o.c:639:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses Corner Nodes");
data/z88-13.0.0+dfsg2/src/cb88o.c:641:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen pro Element");
data/z88-13.0.0+dfsg2/src/cb88o.c:642:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses per Element");
data/z88-13.0.0+dfsg2/src/cb88o.c:644:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen Gausspunkte");
data/z88-13.0.0+dfsg2/src/cb88o.c:645:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses Gauss Points");
data/z88-13.0.0+dfsg2/src/cb88o.c:647:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen X");
data/z88-13.0.0+dfsg2/src/cb88o.c:648:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections X");
data/z88-13.0.0+dfsg2/src/cb88o.c:650:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen Y");
data/z88-13.0.0+dfsg2/src/cb88o.c:651:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections Y");
data/z88-13.0.0+dfsg2/src/cb88o.c:653:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen Z");
data/z88-13.0.0+dfsg2/src/cb88o.c:654:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections Z");
data/z88-13.0.0+dfsg2/src/cb88o.c:669:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char             cstring[80];
data/z88-13.0.0+dfsg2/src/cb88o.c:673:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Licht");
data/z88-13.0.0+dfsg2/src/cb88o.c:674:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Light");
data/z88-13.0.0+dfsg2/src/cb88o.c:676:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(cstring,"Hidden Line");
data/z88-13.0.0+dfsg2/src/cb88o.c:678:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(cstring,"* Wireframe");
data/z88-13.0.0+dfsg2/src/cb88o.c:680:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen Eckknoten");
data/z88-13.0.0+dfsg2/src/cb88o.c:681:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses Corner Nodes");
data/z88-13.0.0+dfsg2/src/cb88o.c:683:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen pro Element");
data/z88-13.0.0+dfsg2/src/cb88o.c:684:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses per Element");
data/z88-13.0.0+dfsg2/src/cb88o.c:686:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen Gausspunkte");
data/z88-13.0.0+dfsg2/src/cb88o.c:687:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses Gauss Points");
data/z88-13.0.0+dfsg2/src/cb88o.c:689:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen X");
data/z88-13.0.0+dfsg2/src/cb88o.c:690:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections X");
data/z88-13.0.0+dfsg2/src/cb88o.c:692:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen Y");
data/z88-13.0.0+dfsg2/src/cb88o.c:693:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections Y");
data/z88-13.0.0+dfsg2/src/cb88o.c:695:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen Z");
data/z88-13.0.0+dfsg2/src/cb88o.c:696:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections Z");
data/z88-13.0.0+dfsg2/src/cb88o.c:711:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char             cstring[80];
data/z88-13.0.0+dfsg2/src/cb88o.c:715:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Licht");
data/z88-13.0.0+dfsg2/src/cb88o.c:716:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Light");
data/z88-13.0.0+dfsg2/src/cb88o.c:718:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(cstring,"Hidden Line");
data/z88-13.0.0+dfsg2/src/cb88o.c:720:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(cstring,"Wireframe");
data/z88-13.0.0+dfsg2/src/cb88o.c:722:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"* Spannungen Eckknoten");
data/z88-13.0.0+dfsg2/src/cb88o.c:723:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"* Stresses Corner Nodes");
data/z88-13.0.0+dfsg2/src/cb88o.c:725:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen pro Element");
data/z88-13.0.0+dfsg2/src/cb88o.c:726:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses per Element");
data/z88-13.0.0+dfsg2/src/cb88o.c:728:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen Gausspunkte");
data/z88-13.0.0+dfsg2/src/cb88o.c:729:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses Gauss Points");
data/z88-13.0.0+dfsg2/src/cb88o.c:731:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen X");
data/z88-13.0.0+dfsg2/src/cb88o.c:732:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections X");
data/z88-13.0.0+dfsg2/src/cb88o.c:734:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen Y");
data/z88-13.0.0+dfsg2/src/cb88o.c:735:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections Y");
data/z88-13.0.0+dfsg2/src/cb88o.c:737:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen Z");
data/z88-13.0.0+dfsg2/src/cb88o.c:738:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections Z");
data/z88-13.0.0+dfsg2/src/cb88o.c:753:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char             cstring[80];
data/z88-13.0.0+dfsg2/src/cb88o.c:757:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Licht");
data/z88-13.0.0+dfsg2/src/cb88o.c:758:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Light");
data/z88-13.0.0+dfsg2/src/cb88o.c:760:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(cstring,"Hidden Line");
data/z88-13.0.0+dfsg2/src/cb88o.c:762:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(cstring,"Wireframe");
data/z88-13.0.0+dfsg2/src/cb88o.c:764:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen Eckknoten");
data/z88-13.0.0+dfsg2/src/cb88o.c:765:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses Corner Nodes");
data/z88-13.0.0+dfsg2/src/cb88o.c:767:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"* Spannungen pro Element");
data/z88-13.0.0+dfsg2/src/cb88o.c:768:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"* Stresses per Element");
data/z88-13.0.0+dfsg2/src/cb88o.c:770:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen Gausspunkte");
data/z88-13.0.0+dfsg2/src/cb88o.c:771:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses Gauss Points");
data/z88-13.0.0+dfsg2/src/cb88o.c:773:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen X");
data/z88-13.0.0+dfsg2/src/cb88o.c:774:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections X");
data/z88-13.0.0+dfsg2/src/cb88o.c:776:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen Y");
data/z88-13.0.0+dfsg2/src/cb88o.c:777:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections Y");
data/z88-13.0.0+dfsg2/src/cb88o.c:779:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen Z");
data/z88-13.0.0+dfsg2/src/cb88o.c:780:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections Z");
data/z88-13.0.0+dfsg2/src/cb88o.c:795:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char             cstring[80];
data/z88-13.0.0+dfsg2/src/cb88o.c:799:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Licht");
data/z88-13.0.0+dfsg2/src/cb88o.c:800:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Light");
data/z88-13.0.0+dfsg2/src/cb88o.c:802:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(cstring,"Hidden Line");
data/z88-13.0.0+dfsg2/src/cb88o.c:804:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(cstring,"Wireframe");
data/z88-13.0.0+dfsg2/src/cb88o.c:806:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen Eckknoten");
data/z88-13.0.0+dfsg2/src/cb88o.c:807:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses Corner Nodes");
data/z88-13.0.0+dfsg2/src/cb88o.c:809:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen pro Element");
data/z88-13.0.0+dfsg2/src/cb88o.c:810:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses per Element");
data/z88-13.0.0+dfsg2/src/cb88o.c:812:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"* Spannungen Gausspunkte");
data/z88-13.0.0+dfsg2/src/cb88o.c:813:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"* Stresses Gauss Points");
data/z88-13.0.0+dfsg2/src/cb88o.c:815:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen X");
data/z88-13.0.0+dfsg2/src/cb88o.c:816:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections X");
data/z88-13.0.0+dfsg2/src/cb88o.c:818:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen Y");
data/z88-13.0.0+dfsg2/src/cb88o.c:819:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections Y");
data/z88-13.0.0+dfsg2/src/cb88o.c:821:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen Z");
data/z88-13.0.0+dfsg2/src/cb88o.c:822:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections Z");
data/z88-13.0.0+dfsg2/src/cb88o.c:837:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char             cstring[80];
data/z88-13.0.0+dfsg2/src/cb88o.c:841:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Licht");
data/z88-13.0.0+dfsg2/src/cb88o.c:842:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Light");
data/z88-13.0.0+dfsg2/src/cb88o.c:844:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(cstring,"Hidden Line");
data/z88-13.0.0+dfsg2/src/cb88o.c:846:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(cstring,"Wireframe");
data/z88-13.0.0+dfsg2/src/cb88o.c:848:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen Eckknoten");
data/z88-13.0.0+dfsg2/src/cb88o.c:849:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses Corner Nodes");
data/z88-13.0.0+dfsg2/src/cb88o.c:851:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen pro Element");
data/z88-13.0.0+dfsg2/src/cb88o.c:852:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses per Element");
data/z88-13.0.0+dfsg2/src/cb88o.c:854:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen Gausspunkte");
data/z88-13.0.0+dfsg2/src/cb88o.c:855:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses Gauss Points");
data/z88-13.0.0+dfsg2/src/cb88o.c:857:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"* Verschiebungen X");
data/z88-13.0.0+dfsg2/src/cb88o.c:858:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"* Deflections X");
data/z88-13.0.0+dfsg2/src/cb88o.c:860:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen Y");
data/z88-13.0.0+dfsg2/src/cb88o.c:861:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections Y");
data/z88-13.0.0+dfsg2/src/cb88o.c:863:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen Z");
data/z88-13.0.0+dfsg2/src/cb88o.c:864:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections Z");
data/z88-13.0.0+dfsg2/src/cb88o.c:879:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char             cstring[80];
data/z88-13.0.0+dfsg2/src/cb88o.c:883:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Licht");
data/z88-13.0.0+dfsg2/src/cb88o.c:884:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Light");
data/z88-13.0.0+dfsg2/src/cb88o.c:886:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(cstring,"Hidden Line");
data/z88-13.0.0+dfsg2/src/cb88o.c:888:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(cstring,"Wireframe");
data/z88-13.0.0+dfsg2/src/cb88o.c:890:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen Eckknoten");
data/z88-13.0.0+dfsg2/src/cb88o.c:891:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses Corner Nodes");
data/z88-13.0.0+dfsg2/src/cb88o.c:893:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen pro Element");
data/z88-13.0.0+dfsg2/src/cb88o.c:894:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses per Element");
data/z88-13.0.0+dfsg2/src/cb88o.c:896:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen Gausspunkte");
data/z88-13.0.0+dfsg2/src/cb88o.c:897:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses Gauss Points");
data/z88-13.0.0+dfsg2/src/cb88o.c:899:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen X");
data/z88-13.0.0+dfsg2/src/cb88o.c:900:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections X");
data/z88-13.0.0+dfsg2/src/cb88o.c:902:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"* Verschiebungen Y");
data/z88-13.0.0+dfsg2/src/cb88o.c:903:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"* Deflections Y");
data/z88-13.0.0+dfsg2/src/cb88o.c:905:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen Z");
data/z88-13.0.0+dfsg2/src/cb88o.c:906:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections Z");
data/z88-13.0.0+dfsg2/src/cb88o.c:921:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char             cstring[80];
data/z88-13.0.0+dfsg2/src/cb88o.c:925:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Licht");
data/z88-13.0.0+dfsg2/src/cb88o.c:926:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Light");
data/z88-13.0.0+dfsg2/src/cb88o.c:928:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(cstring,"Hidden Line");
data/z88-13.0.0+dfsg2/src/cb88o.c:930:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(cstring,"Wireframe");
data/z88-13.0.0+dfsg2/src/cb88o.c:932:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen Eckknoten");
data/z88-13.0.0+dfsg2/src/cb88o.c:933:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses Corner Nodes");
data/z88-13.0.0+dfsg2/src/cb88o.c:935:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen pro Element");
data/z88-13.0.0+dfsg2/src/cb88o.c:936:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses per Element");
data/z88-13.0.0+dfsg2/src/cb88o.c:938:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen Gausspunkte");
data/z88-13.0.0+dfsg2/src/cb88o.c:939:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses Gauss Points");
data/z88-13.0.0+dfsg2/src/cb88o.c:941:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen X");
data/z88-13.0.0+dfsg2/src/cb88o.c:942:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections X");
data/z88-13.0.0+dfsg2/src/cb88o.c:944:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen Y");
data/z88-13.0.0+dfsg2/src/cb88o.c:945:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections Y");
data/z88-13.0.0+dfsg2/src/cb88o.c:947:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"* Verschiebungen Z");
data/z88-13.0.0+dfsg2/src/cb88o.c:948:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"* Deflections Z");
data/z88-13.0.0+dfsg2/src/cb88o.c:998:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char           ckvon[20],ckbis[20];
data/z88-13.0.0+dfsg2/src/cb88o.c:1006:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cstring[80];
data/z88-13.0.0+dfsg2/src/cb88o.c:1012:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(ckvon,"%ld",jkvon);
data/z88-13.0.0+dfsg2/src/cb88o.c:1013:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(ckbis,"%ld",jkbis);
data/z88-13.0.0+dfsg2/src/cb88o.c:1015:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"KNOTENNUM.");
data/z88-13.0.0+dfsg2/src/cb88o.c:1016:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"NODE NUM..");
data/z88-13.0.0+dfsg2/src/cb88o.c:1022:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Von");
data/z88-13.0.0+dfsg2/src/cb88o.c:1023:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"From");
data/z88-13.0.0+dfsg2/src/cb88o.c:1025:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Bis");
data/z88-13.0.0+dfsg2/src/cb88o.c:1026:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"To");
data/z88-13.0.0+dfsg2/src/cb88o.c:1052:10:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  jkvon= atol(cvon);
data/z88-13.0.0+dfsg2/src/cb88o.c:1053:10:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  jkbis= atol(cbis);
data/z88-13.0.0+dfsg2/src/cb88o.c:1070:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char           ckvon[20],ckbis[20];
data/z88-13.0.0+dfsg2/src/cb88o.c:1078:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cstring[80];
data/z88-13.0.0+dfsg2/src/cb88o.c:1084:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(ckvon,"%ld",jevon);
data/z88-13.0.0+dfsg2/src/cb88o.c:1085:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(ckbis,"%ld",jebis);
data/z88-13.0.0+dfsg2/src/cb88o.c:1087:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"ELEMENTNUM.");
data/z88-13.0.0+dfsg2/src/cb88o.c:1088:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"ELEMENT NUM..");
data/z88-13.0.0+dfsg2/src/cb88o.c:1094:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Von");
data/z88-13.0.0+dfsg2/src/cb88o.c:1095:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"From");
data/z88-13.0.0+dfsg2/src/cb88o.c:1097:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Bis");
data/z88-13.0.0+dfsg2/src/cb88o.c:1098:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"To");
data/z88-13.0.0+dfsg2/src/cb88o.c:1124:10:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  jevon= atol(cvon);
data/z88-13.0.0+dfsg2/src/cb88o.c:1125:10:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  jebis= atol(cbis);
data/z88-13.0.0+dfsg2/src/cb88o.c:1157:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cfux[31],cfuy[31],cfuz[31];
data/z88-13.0.0+dfsg2/src/cb88o.c:1158:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cstring[80];
data/z88-13.0.0+dfsg2/src/cb88o.c:1168:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"VERGROESSERUNG VER.");
data/z88-13.0.0+dfsg2/src/cb88o.c:1169:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"MAGNIFICATION DEFL.");
data/z88-13.0.0+dfsg2/src/cb88o.c:1227:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char crotx[31],croty[31],crotz[31];
data/z88-13.0.0+dfsg2/src/cb88o.c:1228:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cstring[80];
data/z88-13.0.0+dfsg2/src/cb88o.c:1238:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"ROTATIONEN 3-D");
data/z88-13.0.0+dfsg2/src/cb88o.c:1239:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"ROTATIONS 3-D");
data/z88-13.0.0+dfsg2/src/cb88o.c:1302:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char czm[31];
data/z88-13.0.0+dfsg2/src/cb88o.c:1303:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cstring[80];
data/z88-13.0.0+dfsg2/src/cb88o.c:1311:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Z-Limit zum Betrachter");
data/z88-13.0.0+dfsg2/src/cb88o.c:1312:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Z Limit towards you");
data/z88-13.0.0+dfsg2/src/cb88o.c:1642:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fo2= fopen("z88o2.txt","r");
data/z88-13.0.0+dfsg2/src/cb88o.c:1661:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fi2= fopen("z88i2.txt","r");
data/z88-13.0.0+dfsg2/src/cb88o.c:1690:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fi5= fopen("z88i5.txt","r");
data/z88-13.0.0+dfsg2/src/cb88o.c:1720:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fo8= fopen("z88o8.txt","r");
data/z88-13.0.0+dfsg2/src/cb88o.c:1741:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fo5= fopen("z88o5.txt","r");
data/z88-13.0.0+dfsg2/src/cosm88.c:100:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char               cstring[255];
data/z88-13.0.0+dfsg2/src/cosm88.c:112:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if((fpro= fopen(ccos,"r"))== NULL)
data/z88-13.0.0+dfsg2/src/cosm88.c:128:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if((fi1= fopen("z88i1.txt","w"))== NULL)
data/z88-13.0.0+dfsg2/src/cosm88.c:141:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if((fi2= fopen("z88i2.txt","w"))== NULL)
data/z88-13.0.0+dfsg2/src/cosm88.c:154:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if((fi3= fopen("z88i3.txt","w"))== NULL)
data/z88-13.0.0+dfsg2/src/cosm88.c:210:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      nkn= atoi(cteils);
data/z88-13.0.0+dfsg2/src/cosm88.c:300:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nkn= atoi(cteils);
data/z88-13.0.0+dfsg2/src/cosm88.c:332:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    k= atoi(cteils);
data/z88-13.0.0+dfsg2/src/cosm88.c:339:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      koi[i] = atoi(cteils);
data/z88-13.0.0+dfsg2/src/cosm88.c:359:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    k= atoi(cteils);
data/z88-13.0.0+dfsg2/src/cosm88.c:366:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      koi[i] = atoi(cteils);
data/z88-13.0.0+dfsg2/src/cosm88.c:399:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    k= atoi(cteils);
data/z88-13.0.0+dfsg2/src/cosm88.c:406:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      koi[i] = atoi(cteils);
data/z88-13.0.0+dfsg2/src/cosm88.c:440:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    k= atoi(cteils);
data/z88-13.0.0+dfsg2/src/cosm88.c:447:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      koi[i] = atoi(cteils);
data/z88-13.0.0+dfsg2/src/cosm88.c:464:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nkn= atoi(cteils);	
data/z88-13.0.0+dfsg2/src/cosm88.c:509:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nkn= atoi(cteils);	
data/z88-13.0.0+dfsg2/src/cosm88.c:643:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      nkn= atoi(cteils);
data/z88-13.0.0+dfsg2/src/dnas88.c:108:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char               cstring[255],c2zeile[255],cdummy[80],cdummy2[80];
data/z88-13.0.0+dfsg2/src/dnas88.c:113:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if((fpro= fopen(cnas,"r"))== NULL)
data/z88-13.0.0+dfsg2/src/dnas88.c:129:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if((fin= fopen(cin,"w+"))== NULL)
data/z88-13.0.0+dfsg2/src/dnas88.c:156:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if((fi1= fopen(ci1,"w"))== NULL)
data/z88-13.0.0+dfsg2/src/dnas88.c:169:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if((fi2= fopen(ci2,"w"))== NULL)
data/z88-13.0.0+dfsg2/src/dnas88.c:182:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if((fi3= fopen(ci3,"w"))== NULL)
data/z88-13.0.0+dfsg2/src/dnas88.c:195:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if((fi5= fopen(ci5,"w"))== NULL)
data/z88-13.0.0+dfsg2/src/dyn88d.c:107:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char   cline[256], cdummy[80];
data/z88-13.0.0+dfsg2/src/dyn88d.c:114:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/dyn88e.c:111:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char   cline[256], cdummy[80];
data/z88-13.0.0+dfsg2/src/dyn88e.c:118:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/dyn88f.c:112:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char   cline[256], cdummy[80];
data/z88-13.0.0+dfsg2/src/dyn88f.c:127:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/dyn88i1.c:103:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char   cline[256], cdummy[80];
data/z88-13.0.0+dfsg2/src/dyn88i1.c:110:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/dyn88i2.c:121:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char   cline[256], cdummy[80];
data/z88-13.0.0+dfsg2/src/dyn88i2.c:136:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/dyn88n.c:109:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256], cdummy[80];
data/z88-13.0.0+dfsg2/src/dyn88n.c:115:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/dyn88o.c:115:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256], cdummy[80];
data/z88-13.0.0+dfsg2/src/dyn88o.c:121:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/dyn88v.c:86:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256], cdummy[80];
data/z88-13.0.0+dfsg2/src/dyn88v.c:93:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/dyn88x.c:120:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256], cdummy[80];
data/z88-13.0.0+dfsg2/src/dyn88x.c:139:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/fr_func.c:54:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cstring[80];
data/z88-13.0.0+dfsg2/src/g1i188.c:73:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/g1i388.c:68:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/g1i488.c:69:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/g2i188.c:74:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/g3i188.c:77:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/g4i188.c:73:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256],clina[256];
data/z88-13.0.0+dfsg2/src/g5i188.c:73:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/gxi288.c:69:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/gxi288.c:165:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256],clina[256];
data/z88-13.0.0+dfsg2/src/gxi588.c:69:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/gxi588.c:140:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/koi88x.c:85:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/lan88c.c:78:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/lan88c.c:83:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fwlo= fopen(clgd, "w+");
data/z88-13.0.0+dfsg2/src/lan88c.c:96:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/lan88d.c:78:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/lan88d.c:83:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fwlo= fopen(clgd, "w+");
data/z88-13.0.0+dfsg2/src/lan88d.c:96:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/lan88e.c:78:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/lan88e.c:83:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fwlo= fopen(clgd, "w+");
data/z88-13.0.0+dfsg2/src/lan88e.c:96:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/lan88f.c:78:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/lan88f.c:83:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fwlo= fopen(clgd, "w+");
data/z88-13.0.0+dfsg2/src/lan88f.c:96:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/lan88g.c:78:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/lan88g.c:83:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fwlo= fopen(clgd, "w+");
data/z88-13.0.0+dfsg2/src/lan88g.c:96:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/lan88h.c:78:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/lan88h.c:83:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fwlo= fopen(clgd, "w+");
data/z88-13.0.0+dfsg2/src/lan88h.c:96:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/lan88i1.c:78:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/lan88i1.c:83:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fl1= fopen(cl1, "w+");
data/z88-13.0.0+dfsg2/src/lan88i1.c:96:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/lan88i2.c:78:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/lan88i2.c:83:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fl2= fopen(cl2, "w+");
data/z88-13.0.0+dfsg2/src/lan88i2.c:96:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/lan88n.c:78:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/lan88n.c:83:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fwlo= fopen(clgd, "w+");
data/z88-13.0.0+dfsg2/src/lan88n.c:96:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/lan88o.c:76:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/lan88o.c:81:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fwlo= fopen(clgd, "w+");
data/z88-13.0.0+dfsg2/src/lan88o.c:94:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/lan88v.c:78:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/lan88v.c:83:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fwlo= fopen(clgd, "w+");
data/z88-13.0.0+dfsg2/src/lan88v.c:96:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/lan88x.c:78:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/lan88x.c:83:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fwlo= fopen(clgd, "w+");
data/z88-13.0.0+dfsg2/src/lan88x.c:96:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/m10.c:86:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/m15.c:75:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char               cstring[80];
data/z88-13.0.0+dfsg2/src/m15.c:86:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[1],fspa[2]);
data/z88-13.0.0+dfsg2/src/m15.c:93:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[2],fspa[3]);
data/z88-13.0.0+dfsg2/src/m15.c:100:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[3],fspa[4]);
data/z88-13.0.0+dfsg2/src/m15.c:107:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[4],fspa[5]);
data/z88-13.0.0+dfsg2/src/m15.c:114:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[5],fspa[6]);
data/z88-13.0.0+dfsg2/src/m15.c:121:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[6],fspa[7]);
data/z88-13.0.0+dfsg2/src/m15.c:128:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[7],fspa[8]);
data/z88-13.0.0+dfsg2/src/m15.c:135:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[8],fspa[9]);
data/z88-13.0.0+dfsg2/src/m15.c:142:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[9],fspa[10]);
data/z88-13.0.0+dfsg2/src/m15.c:149:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[10],fspa[11]);
data/z88-13.0.0+dfsg2/src/m15.c:156:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[11],fspa[12]);
data/z88-13.0.0+dfsg2/src/m15.c:163:31:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1 && isflag == 0)strcpy(cstring,"keine V-Spannungen");
data/z88-13.0.0+dfsg2/src/m15.c:164:31:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2 && isflag == 0)strcpy(cstring,"no reduced Stresses");
data/z88-13.0.0+dfsg2/src/m15.c:165:31:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1 && isflag == 1)strcpy(cstring,"V-Spannungen (GEH)");
data/z88-13.0.0+dfsg2/src/m15.c:166:31:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2 && isflag == 1)strcpy(cstring,"v.Mises Stresses");
data/z88-13.0.0+dfsg2/src/m15.c:167:31:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1 && isflag == 2)strcpy(cstring,"V-Spannungen (NH)");
data/z88-13.0.0+dfsg2/src/m15.c:168:31:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2 && isflag == 2)strcpy(cstring,"principal Stresses");
data/z88-13.0.0+dfsg2/src/m15.c:169:31:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1 && isflag == 3)strcpy(cstring,"V-Spannungen (SH)");
data/z88-13.0.0+dfsg2/src/m15.c:170:31:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2 && isflag == 3)strcpy(cstring,"Tresca Stresses");
data/z88-13.0.0+dfsg2/src/m15.c:178:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1)strcpy(cstring,"in den Eckknoten");
data/z88-13.0.0+dfsg2/src/m15.c:179:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2)strcpy(cstring,"in corner nodes");
data/z88-13.0.0+dfsg2/src/m15.c:186:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1)strcpy(cstring,"pro Element gemittelt");
data/z88-13.0.0+dfsg2/src/m15.c:187:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2)strcpy(cstring,"mean value per element");
data/z88-13.0.0+dfsg2/src/m15.c:194:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  if(LANG == 1)sprintf(cstring,"in %ld Gausspunkten",igpanz);
data/z88-13.0.0+dfsg2/src/m15.c:195:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  if(LANG == 2)sprintf(cstring,"in %ld Gauss points",igpanz);
data/z88-13.0.0+dfsg2/src/m15.c:204:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1)strcpy(cstring,"X-Verschiebungen");
data/z88-13.0.0+dfsg2/src/m15.c:205:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2)strcpy(cstring,"X Displacements");
data/z88-13.0.0+dfsg2/src/m15.c:213:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1)strcpy(cstring,"Y-Verschiebungen");
data/z88-13.0.0+dfsg2/src/m15.c:214:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2)strcpy(cstring,"Y Displacements");
data/z88-13.0.0+dfsg2/src/m15.c:222:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1)strcpy(cstring,"Z-Verschiebungen");
data/z88-13.0.0+dfsg2/src/m15.c:223:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2)strcpy(cstring,"Z Displacements");
data/z88-13.0.0+dfsg2/src/m15.c:245:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char               cstring[80];
data/z88-13.0.0+dfsg2/src/m15.c:267:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(cstring,"%ld",i);
data/z88-13.0.0+dfsg2/src/m15.c:299:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char               cstring[80];
data/z88-13.0.0+dfsg2/src/m15.c:338:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(cstring,"%ld",i);
data/z88-13.0.0+dfsg2/src/m15.c:362:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(cstring,"%ld",i);
data/z88-13.0.0+dfsg2/src/m15.c:392:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(cstring,"%ld",i);
data/z88-13.0.0+dfsg2/src/m15.c:426:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(cstring,"%ld",i);
data/z88-13.0.0+dfsg2/src/m15.c:461:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(cstring,"%ld",i);
data/z88-13.0.0+dfsg2/src/m15.c:489:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(cstring,"%ld",i);
data/z88-13.0.0+dfsg2/src/m15.c:517:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(cstring,"%ld",i);
data/z88-13.0.0+dfsg2/src/m15.c:577:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(cstring,"%ld",i);
data/z88-13.0.0+dfsg2/src/m15.c:622:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(cstring,"%ld",i);
data/z88-13.0.0+dfsg2/src/m15.c:687:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(cstring,"%ld",i);
data/z88-13.0.0+dfsg2/src/m15.c:748:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char               cstring[80];
data/z88-13.0.0+dfsg2/src/m15.c:759:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 1) sprintf(cstring,"U1=UX=0 (Platten:UZ=0)");
data/z88-13.0.0+dfsg2/src/m15.c:760:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 2) sprintf(cstring,"U1=UX=0 (Plates: UZ=0)");
data/z88-13.0.0+dfsg2/src/m15.c:767:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 1) sprintf(cstring,"U2=UY=0 (Platten:RotX=0)");
data/z88-13.0.0+dfsg2/src/m15.c:768:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 2) sprintf(cstring,"U2=UY=0 (Plates: RotX=0)");
data/z88-13.0.0+dfsg2/src/m15.c:775:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 1) sprintf(cstring,"U3=UZ=0 (Platten:RotY=0)");
data/z88-13.0.0+dfsg2/src/m15.c:776:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 2) sprintf(cstring,"U3=UZ=0 (Plates: RotY=0)");
data/z88-13.0.0+dfsg2/src/m15.c:783:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 1) sprintf(cstring,"U4=RotX=0");
data/z88-13.0.0+dfsg2/src/m15.c:784:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 2) sprintf(cstring,"U4=RotX=0");
data/z88-13.0.0+dfsg2/src/m15.c:791:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 1) sprintf(cstring,"U5=RotY=0");
data/z88-13.0.0+dfsg2/src/m15.c:792:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 2) sprintf(cstring,"U5=RotY=0");
data/z88-13.0.0+dfsg2/src/m15.c:799:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 1) sprintf(cstring,"U6=RotZ=0");
data/z88-13.0.0+dfsg2/src/m15.c:800:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 2) sprintf(cstring,"U6=RotZ=0");
data/z88-13.0.0+dfsg2/src/m15.c:807:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 1) sprintf(cstring,"Verschiebungen gegeben");
data/z88-13.0.0+dfsg2/src/m15.c:808:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 2) sprintf(cstring,"Displacements given");
data/z88-13.0.0+dfsg2/src/m15.c:815:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 1) sprintf(cstring,"Druck/Oberflaechenlasten");
data/z88-13.0.0+dfsg2/src/m15.c:816:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 2) sprintf(cstring,"Surface/Pressure Loads");
data/z88-13.0.0+dfsg2/src/m15.c:823:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 1) sprintf(cstring,"Kraefte X");
data/z88-13.0.0+dfsg2/src/m15.c:824:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 2) sprintf(cstring,"Forces X");
data/z88-13.0.0+dfsg2/src/m15.c:831:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 1) sprintf(cstring,"Kraefte Y");
data/z88-13.0.0+dfsg2/src/m15.c:832:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 2) sprintf(cstring,"Forces Y");
data/z88-13.0.0+dfsg2/src/m15.c:839:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 1) sprintf(cstring,"Kraefte Z");
data/z88-13.0.0+dfsg2/src/m15.c:840:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
if(LANG == 2) sprintf(cstring,"Forces Z");
data/z88-13.0.0+dfsg2/src/m16.c:357:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/m9.c:89:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char               cline[256];
data/z88-13.0.0+dfsg2/src/m9.c:133:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char               cline[256];
data/z88-13.0.0+dfsg2/src/m9.c:194:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char               cline[256];
data/z88-13.0.0+dfsg2/src/m9.c:253:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/nast88.c:103:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char               cstring[255],c2zeile[255],cdummy[80],cdummy2[80];
data/z88-13.0.0+dfsg2/src/nast88.c:113:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if((fpro= fopen(cnas,"r"))== NULL)
data/z88-13.0.0+dfsg2/src/nast88.c:129:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if((fin= fopen(cin,"w+"))== NULL)
data/z88-13.0.0+dfsg2/src/nast88.c:156:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if((fi1= fopen("z88i1.txt","w"))== NULL)
data/z88-13.0.0+dfsg2/src/nast88.c:169:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if((fi2= fopen("z88i2.txt","w"))== NULL)
data/z88-13.0.0+dfsg2/src/nast88.c:182:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if((fi3= fopen("z88i3.txt","w"))== NULL)
data/z88-13.0.0+dfsg2/src/r1y88i.c:104:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
f1y= fopen(c1y,"rb");
data/z88-13.0.0+dfsg2/src/r4y88i.c:81:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
f4y= fopen(c4y,"rb");
data/z88-13.0.0+dfsg2/src/rcol88c.c:65:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256], cdummy[80];
data/z88-13.0.0+dfsg2/src/rcol88c.c:70:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fcol= fopen("z88.fcd","rb"); /* fcd = fonts, colors, dimensions       */
data/z88-13.0.0+dfsg2/src/rcoo88.c:84:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char             cline[256], cdummy[80];
data/z88-13.0.0+dfsg2/src/rcoo88.c:89:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fcol= fopen("z88.fcd","rb"); /* fcd = fonts, colors, dimensions       */
data/z88-13.0.0+dfsg2/src/rdy88h.c:77:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256], cdummy[80];
data/z88-13.0.0+dfsg2/src/rdy88h.c:83:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdyn= fopen(cdyn,"r");
data/z88-13.0.0+dfsg2/src/rea88x.c:123:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/rea88x.c:137:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fz88= fopen(ci1,"r");
data/z88-13.0.0+dfsg2/src/rea88x.c:154:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fz88= fopen(cni,"r");
data/z88-13.0.0+dfsg2/src/rea88x.c:532:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fi2= fopen(ci2,"r");
data/z88-13.0.0+dfsg2/src/rea88x.c:557:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fi3= fopen(ci3,"r");
data/z88-13.0.0+dfsg2/src/rea88x.c:578:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fi5= fopen(ci5,"r");
data/z88-13.0.0+dfsg2/src/ri188.c:128:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/ri188.c:139:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fi1= fopen(ci1,"r");
data/z88-13.0.0+dfsg2/src/ri188i.c:128:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/ri188i.c:139:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fi1= fopen(ci1,"r");
data/z88-13.0.0+dfsg2/src/ri588.c:116:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/ri588.c:127:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fi5= fopen(ci5,"r");
data/z88-13.0.0+dfsg2/src/ri588i.c:115:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/ri588i.c:126:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fi5= fopen(ci5,"r");
data/z88-13.0.0+dfsg2/src/riy88.c:103:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
f1y= fopen(c1y,"rb");
data/z88-13.0.0+dfsg2/src/riy88.c:112:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
f3y= fopen(c3y,"rb");
data/z88-13.0.0+dfsg2/src/riy88d.c:107:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
f1y= fopen(c1y,"rb");
data/z88-13.0.0+dfsg2/src/riy88d.c:116:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
f3y= fopen(c3y,"rb");
data/z88-13.0.0+dfsg2/src/rni88.c:104:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/rni88.c:116:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fni= fopen(cni,"r");
data/z88-13.0.0+dfsg2/src/rni88.c:129:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fi1= fopen(ci1,"w+");
data/z88-13.0.0+dfsg2/src/w4y88i.c:81:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
f4y= fopen(c4y,"w+b");
data/z88-13.0.0+dfsg2/src/wria88f.c:153:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
f1y= fopen(c1y,"w+b");
data/z88-13.0.0+dfsg2/src/wria88f.c:163:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fo0= fopen(co0,"w+");
data/z88-13.0.0+dfsg2/src/wria88i.c:155:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
f1y= fopen(c1y,"w+b");
data/z88-13.0.0+dfsg2/src/wria88i.c:165:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fo0= fopen(co0,"w+");
data/z88-13.0.0+dfsg2/src/wria88x.c:137:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fz88= fopen(ci1,"w");
data/z88-13.0.0+dfsg2/src/wria88x.c:176:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fz88= fopen(cni,"w");
data/z88-13.0.0+dfsg2/src/wria88x.c:391:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fi2= fopen(ci2,"w");
data/z88-13.0.0+dfsg2/src/wria88x.c:423:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fi3= fopen(ci3,"w");
data/z88-13.0.0+dfsg2/src/wria88x.c:457:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fi5= fopen(ci5,"w");
data/z88-13.0.0+dfsg2/src/z88ai.c:106:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char flags[2], high_dyn_flag;
data/z88-13.0.0+dfsg2/src/z88cc.c:132:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/z88cc.c:143:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fi2= fopen(ci2,"r");
data/z88-13.0.0+dfsg2/src/z88cc.c:153:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
f3y= fopen(c3y,"w+b");
data/z88-13.0.0+dfsg2/src/z88cc.c:163:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fo1= fopen(co1,"w+");
data/z88-13.0.0+dfsg2/src/z88cc.c:173:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fo2= fopen(co2,"w+");
data/z88-13.0.0+dfsg2/src/z88ci.c:137:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/z88ci.c:148:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fi2= fopen(ci2,"r");
data/z88-13.0.0+dfsg2/src/z88ci.c:158:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fi4= fopen(ci4,"r");
data/z88-13.0.0+dfsg2/src/z88ci.c:168:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
f3y= fopen(c3y,"w+b");
data/z88-13.0.0+dfsg2/src/z88ci.c:178:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fo1= fopen(co1,"w+");
data/z88-13.0.0+dfsg2/src/z88ci.c:188:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fo2= fopen(co2,"w+");
data/z88-13.0.0+dfsg2/src/z88com.c:81:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char       CEDITOR[128],CBROWSER[128],CPREFIX[128];
data/z88-13.0.0+dfsg2/src/z88com.c:83:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char       cdyn[12] = "z88.dyn";  
data/z88-13.0.0+dfsg2/src/z88com.c:84:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char       clgd[12] = "z88com.log";
data/z88-13.0.0+dfsg2/src/z88com.c:139:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cstring[128];
data/z88-13.0.0+dfsg2/src/z88com.c:192:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Der Z88-Commander Version 13.0");
data/z88-13.0.0+dfsg2/src/z88com.c:193:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"The Z88-Commander Version 13.0");
data/z88-13.0.0+dfsg2/src/z88com.c:201:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Ueberblick");
data/z88-13.0.0+dfsg2/src/z88com.c:202:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Overview");
data/z88-13.0.0+dfsg2/src/z88com.c:206:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Aufrufen der Online-Hilfe fuer einen Ueberblick");
data/z88-13.0.0+dfsg2/src/z88com.c:207:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Call the Online Help for an Overview");
data/z88-13.0.0+dfsg2/src/z88com.c:210:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Info");
data/z88-13.0.0+dfsg2/src/z88com.c:211:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"About");
data/z88-13.0.0+dfsg2/src/z88com.c:215:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Ende");
data/z88-13.0.0+dfsg2/src/z88com.c:216:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Exit");
data/z88-13.0.0+dfsg2/src/z88com.c:220:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Hilfe aus");
data/z88-13.0.0+dfsg2/src/z88com.c:221:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Help is off");
data/z88-13.0.0+dfsg2/src/z88com.c:225:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Umschalten Hilfemode - Befehlsmode");
data/z88-13.0.0+dfsg2/src/z88com.c:226:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Toggle Help Mode - Command Mode");
data/z88-13.0.0+dfsg2/src/z88com.c:232:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Speicher-Steuerdatei Z88.DYN editieren");
data/z88-13.0.0+dfsg2/src/z88com.c:233:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Edit the Memory Definition File Z88.DYN");
data/z88-13.0.0+dfsg2/src/z88com.c:239:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Datei der Einstellungen Z88 fuer UNIX Z88.FCD editieren");
data/z88-13.0.0+dfsg2/src/z88com.c:240:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Edit the Defaults for UNIX File Z88.FCD");
data/z88-13.0.0+dfsg2/src/z88com.c:248:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Editieren der Eingabedateien");
data/z88-13.0.0+dfsg2/src/z88com.c:249:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Edit the Input Files");
data/z88-13.0.0+dfsg2/src/z88com.c:255:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Netzgenerator-Eingabedatei Z88NI.TXT editieren");
data/z88-13.0.0+dfsg2/src/z88com.c:256:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Edit the Mesh Genrator Input File Z88NI.TXT");
data/z88-13.0.0+dfsg2/src/z88com.c:262:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"allgemeine Strukturdaten Z88I1.TXT editieren");
data/z88-13.0.0+dfsg2/src/z88com.c:263:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Edit the Structure File Z88I1.TXT");
data/z88-13.0.0+dfsg2/src/z88com.c:269:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Randbedingungen Z88I2.TXT editieren");
data/z88-13.0.0+dfsg2/src/z88com.c:270:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Edit the Boundary Condition File Z88I2.TXT");
data/z88-13.0.0+dfsg2/src/z88com.c:276:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Steuerdatei Z88I3.TXT fuer die Spannungsberechnung editieren");
data/z88-13.0.0+dfsg2/src/z88com.c:277:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Edit the Flag File for Stresses Z88I3.TXT");
data/z88-13.0.0+dfsg2/src/z88com.c:283:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Steuerdatei Z88I4.TXT fuer die Solver editieren");
data/z88-13.0.0+dfsg2/src/z88com.c:284:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Edit the Flag File for the Solvers Z88I4.TXT");
data/z88-13.0.0+dfsg2/src/z88com.c:290:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Datei der Oberflaechenlasten Z88I5.TXT editieren");
data/z88-13.0.0+dfsg2/src/z88com.c:291:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Edit the File for Surface Loads Z88I5.TXT");
data/z88-13.0.0+dfsg2/src/z88com.c:299:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Prae- und Postprozessoren");
data/z88-13.0.0+dfsg2/src/z88com.c:300:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Pre- and Postprocessors");
data/z88-13.0.0+dfsg2/src/z88com.c:306:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Der Filechecker");
data/z88-13.0.0+dfsg2/src/z88com.c:307:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"The File Checker");
data/z88-13.0.0+dfsg2/src/z88com.c:313:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Der Netzgenerator");
data/z88-13.0.0+dfsg2/src/z88com.c:314:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"The Mesh Generator");
data/z88-13.0.0+dfsg2/src/z88com.c:320:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Die Spannungsberechnung");
data/z88-13.0.0+dfsg2/src/z88com.c:321:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Compute Stresses");
data/z88-13.0.0+dfsg2/src/z88com.c:327:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Die Knotenkraftberechnung");
data/z88-13.0.0+dfsg2/src/z88com.c:328:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Compute Nodal Forces");
data/z88-13.0.0+dfsg2/src/z88com.c:334:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Das OpenGL-Plotprogramm");
data/z88-13.0.0+dfsg2/src/z88com.c:335:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"The OpenGL Plot Program");
data/z88-13.0.0+dfsg2/src/z88com.c:343:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"CAD-Konverter");
data/z88-13.0.0+dfsg2/src/z88com.c:344:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"CAD Converters");
data/z88-13.0.0+dfsg2/src/z88com.c:350:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Der NASTRAN/COSMOS-Konverter");
data/z88-13.0.0+dfsg2/src/z88com.c:351:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"The NASTRAN/COSMOS Converter");
data/z88-13.0.0+dfsg2/src/z88com.c:357:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Der Cuthill-MCKee-Umnummerierer");
data/z88-13.0.0+dfsg2/src/z88com.c:358:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"The Cuthill-McKee Program");
data/z88-13.0.0+dfsg2/src/z88com.c:364:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"von Z88I1.TXT nach Z88X.DXF");
data/z88-13.0.0+dfsg2/src/z88com.c:365:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"from Z88I1.TXT to Z88X.DXF");
data/z88-13.0.0+dfsg2/src/z88com.c:371:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"von Z88I*.TXT nach Z88X.DXF");
data/z88-13.0.0+dfsg2/src/z88com.c:372:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"from Z88I*.TXT to Z88X.DXF");
data/z88-13.0.0+dfsg2/src/z88com.c:378:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"von Z88NI.TXT nach Z88X.DXF");
data/z88-13.0.0+dfsg2/src/z88com.c:379:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"from Z88NI.TXT to Z88X.DXF");
data/z88-13.0.0+dfsg2/src/z88com.c:385:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"von Z88X.DXF nach Z88I1.TXT");
data/z88-13.0.0+dfsg2/src/z88com.c:386:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"from Z88X.DXF to Z88I1.TXT");
data/z88-13.0.0+dfsg2/src/z88com.c:392:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"von Z88X.DXF nach Z88I*.TXT");
data/z88-13.0.0+dfsg2/src/z88com.c:393:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"from Z88X.DXF to Z88I*.TXT");
data/z88-13.0.0+dfsg2/src/z88com.c:399:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"von Z88X.DXF nach Z88NI.TXT");
data/z88-13.0.0+dfsg2/src/z88com.c:400:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"from Z88X.DXF to Z88NI.TXT");
data/z88-13.0.0+dfsg2/src/z88com.c:408:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Die Solver");
data/z88-13.0.0+dfsg2/src/z88com.c:409:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"The Solvers");
data/z88-13.0.0+dfsg2/src/z88com.c:415:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Der Cholesky-Solver fuer kleine Strukturen, Rechenmode");
data/z88-13.0.0+dfsg2/src/z88com.c:416:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"The Cholesky Solver for small structures, Compute Mode");
data/z88-13.0.0+dfsg2/src/z88com.c:422:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Der Cholesky-Solver fuer kleine Strukturen, Testmode");
data/z88-13.0.0+dfsg2/src/z88com.c:423:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"The Cholesky Solver for small structures, Test Mode");
data/z88-13.0.0+dfsg2/src/z88com.c:429:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Der Sparsematrix-Solver Part 1 fuer Z88I2 und Z88PAR");
data/z88-13.0.0+dfsg2/src/z88com.c:430:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"The Sparse Matrix Solver Part 1 for Z88I2 and Z88PAR");
data/z88-13.0.0+dfsg2/src/z88com.c:436:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,
data/z88-13.0.0+dfsg2/src/z88com.c:438:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,
data/z88-13.0.0+dfsg2/src/z88com.c:445:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,
data/z88-13.0.0+dfsg2/src/z88com.c:447:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,
data/z88-13.0.0+dfsg2/src/z88com.c:454:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Der Sparsematrix-Solver Part 2 fuer mittlere Strukturen: Z88PAR");
data/z88-13.0.0+dfsg2/src/z88com.c:455:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"The Sparse Matrix Solver Part 2 for medium sized structures: Z88PAR");
data/z88-13.0.0+dfsg2/src/z88com.c:463:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Editieren der Ausgabedateien");
data/z88-13.0.0+dfsg2/src/z88com.c:464:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Edit the Output Files");
data/z88-13.0.0+dfsg2/src/z88com.c:470:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Aufbereitete Strukturdaten Z88O0.TXT editieren");
data/z88-13.0.0+dfsg2/src/z88com.c:471:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Edit Processed Input Data Z88O0.TXT for documentation");
data/z88-13.0.0+dfsg2/src/z88com.c:477:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Aufbereitete Randbedingungen Z88O1.TXT editieren");
data/z88-13.0.0+dfsg2/src/z88com.c:478:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Edit Processed Boundary Conditions Z88O1.TXT for documentation");
data/z88-13.0.0+dfsg2/src/z88com.c:484:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Berechnete Verschiebungen Z88O2.TXT editieren");
data/z88-13.0.0+dfsg2/src/z88com.c:485:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Edit Computed Displacements Z88O2.TXT");
data/z88-13.0.0+dfsg2/src/z88com.c:491:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Berechnete Spannungen Z88O3.TXT editieren");
data/z88-13.0.0+dfsg2/src/z88com.c:492:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Edit Computed Stresses Z88O3.TXT");
data/z88-13.0.0+dfsg2/src/z88com.c:498:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 1) strcpy(cstring,"Berechnete Knotenkraefte Z88O4.TXT editieren");
data/z88-13.0.0+dfsg2/src/z88com.c:499:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if(LANG == 2) strcpy(cstring,"Edit Computed Nodal Forces Z88O4.TXT");
data/z88-13.0.0+dfsg2/src/z88d.c:137:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cdyn[8] = "z88.dyn";
data/z88-13.0.0+dfsg2/src/z88d.c:138:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char clgd[9] = "z88d.log";
data/z88-13.0.0+dfsg2/src/z88d.c:139:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char c1y[10] = "z88o1.bny";
data/z88-13.0.0+dfsg2/src/z88d.c:140:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char c3y[10] = "z88o3.bny";
data/z88-13.0.0+dfsg2/src/z88d.c:141:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char co3[10] = "z88o3.txt";
data/z88-13.0.0+dfsg2/src/z88d.c:142:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ci3[10] = "z88i3.txt";
data/z88-13.0.0+dfsg2/src/z88d.c:143:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char co5[10] = "z88o5.txt";
data/z88-13.0.0+dfsg2/src/z88d.c:144:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char co8[10] = "z88o8.txt";  
data/z88-13.0.0+dfsg2/src/z88d.c:200:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/z88d.c:246:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fi3= fopen(ci3,"r");
data/z88-13.0.0+dfsg2/src/z88d.c:256:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fo3= fopen(co3,"w+");
data/z88-13.0.0+dfsg2/src/z88d.c:266:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fo5= fopen(co5,"w+");
data/z88-13.0.0+dfsg2/src/z88d.c:276:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fo8= fopen(co8,"w+");
data/z88-13.0.0+dfsg2/src/z88e.c:124:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cdyn[8] = "z88.dyn";
data/z88-13.0.0+dfsg2/src/z88e.c:125:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char clgd[9] = "z88e.log";
data/z88-13.0.0+dfsg2/src/z88e.c:126:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char c1y[10] = "z88o1.bny";
data/z88-13.0.0+dfsg2/src/z88e.c:127:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char c3y[10] = "z88o3.bny";
data/z88-13.0.0+dfsg2/src/z88e.c:128:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char co4[10] = "z88o4.txt";
data/z88-13.0.0+dfsg2/src/z88e.c:242:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fo4= fopen(co4,"w+");
data/z88-13.0.0+dfsg2/src/z88f.c:86:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cdyn[8] = "z88.dyn";
data/z88-13.0.0+dfsg2/src/z88f.c:87:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char clgd[9] = "z88f.log";
data/z88-13.0.0+dfsg2/src/z88f.c:88:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ci1[10] = "z88i1.txt";
data/z88-13.0.0+dfsg2/src/z88f.c:89:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ci2[10] = "z88i2.txt";
data/z88-13.0.0+dfsg2/src/z88f.c:90:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ci5[10] = "z88i5.txt";
data/z88-13.0.0+dfsg2/src/z88f.c:91:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char c1y[10] = "z88o1.bny";
data/z88-13.0.0+dfsg2/src/z88f.c:92:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char c3y[10] = "z88o3.bny";
data/z88-13.0.0+dfsg2/src/z88f.c:93:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char co0[10] = "z88o0.txt";
data/z88-13.0.0+dfsg2/src/z88f.c:94:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char co1[10] = "z88o1.txt";
data/z88-13.0.0+dfsg2/src/z88f.c:95:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char co2[10] = "z88o2.txt";
data/z88-13.0.0+dfsg2/src/z88f.c:177:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cflag[10],cflagul[10];
data/z88-13.0.0+dfsg2/src/z88fx.c:123:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256],ctext[256],cfese[10];
data/z88-13.0.0+dfsg2/src/z88fx.c:153:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdxf= fopen(cxx,"r");
data/z88-13.0.0+dfsg2/src/z88fx.c:427:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(cfese,"SE ");
data/z88-13.0.0+dfsg2/src/z88fx.c:429:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(cfese,"FE ");
data/z88-13.0.0+dfsg2/src/z88g.c:90:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cdyn[8] = "z88.dyn";
data/z88-13.0.0+dfsg2/src/z88g.c:91:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char clgd[9] = "z88g.log";
data/z88-13.0.0+dfsg2/src/z88g.c:92:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ccos[9] = "z88g.cos";
data/z88-13.0.0+dfsg2/src/z88g.c:93:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cnas[9] = "z88g.nas";
data/z88-13.0.0+dfsg2/src/z88g.c:94:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cin[8]  = "z88g.in";
data/z88-13.0.0+dfsg2/src/z88g.c:95:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ci1[10] = "z88i1.txt";
data/z88-13.0.0+dfsg2/src/z88g.c:96:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ci2[10] = "z88i2.txt";
data/z88-13.0.0+dfsg2/src/z88g.c:97:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ci3[10] = "z88i3.txt";
data/z88-13.0.0+dfsg2/src/z88g.c:98:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ci5[10] = "z88i5.txt";
data/z88-13.0.0+dfsg2/src/z88h.c:62:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cdyn[8] = "z88.dyn";
data/z88-13.0.0+dfsg2/src/z88h.c:63:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char clgd[9] = "z88h.log";
data/z88-13.0.0+dfsg2/src/z88h.c:145:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cstring[255];
data/z88-13.0.0+dfsg2/src/z88h.c:152:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if ((fcut=fopen(cfcut,"w"))==NULL)
data/z88-13.0.0+dfsg2/src/z88h.c:162:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if ((fz88i1=fopen(cfi1,"r"))==NULL)
data/z88-13.0.0+dfsg2/src/z88h.c:483:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cstring[255];
data/z88-13.0.0+dfsg2/src/z88h.c:488:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if((fpermdat=fopen(cpermdat,"w"))==NULL)
data/z88-13.0.0+dfsg2/src/z88h.c:498:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if((fcut=fopen(cutfile,"r"))==NULL)
data/z88-13.0.0+dfsg2/src/z88h.c:884:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cstring[255];
data/z88-13.0.0+dfsg2/src/z88h.c:897:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if ((fz88i1old= fopen(cz88i1old,"r")) != NULL)
data/z88-13.0.0+dfsg2/src/z88h.c:903:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if ((fz88i2old= fopen(cz88i2old,"r")) != NULL)
data/z88-13.0.0+dfsg2/src/z88h.c:911:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fz88i5old= fopen(cz88i5old,"r")) != NULL)
data/z88-13.0.0+dfsg2/src/z88h.c:922:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fpermdat= fopen(cpermdat,"r");
data/z88-13.0.0+dfsg2/src/z88h.c:924:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fz88i1old= fopen(cz88i1old,"r");
data/z88-13.0.0+dfsg2/src/z88h.c:925:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fz88i2old= fopen(cz88i2old,"r");
data/z88-13.0.0+dfsg2/src/z88h.c:926:28:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if(iqflag == 1) fz88i5old= fopen(cz88i5old,"r");
data/z88-13.0.0+dfsg2/src/z88h.c:928:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fz88i1=    fopen(cz88i1,"w");
data/z88-13.0.0+dfsg2/src/z88h.c:929:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fz88i2=    fopen(cz88i2,"w");
data/z88-13.0.0+dfsg2/src/z88h.c:930:28:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if(iqflag == 1) fz88i5=    fopen(cz88i5,"w");
data/z88-13.0.0+dfsg2/src/z88i1.c:81:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cdyn[8] = "z88.dyn";
data/z88-13.0.0+dfsg2/src/z88i1.c:82:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cl1[10] = "z88i1.log";
data/z88-13.0.0+dfsg2/src/z88i1.c:83:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ci1[10] = "z88i1.txt";
data/z88-13.0.0+dfsg2/src/z88i1.c:84:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char c1y[10] = "z88o1.bny";
data/z88-13.0.0+dfsg2/src/z88i1.c:85:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char c4y[10] = "z88o4.bny";
data/z88-13.0.0+dfsg2/src/z88i1.c:86:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char co0[10] = "z88o0.txt";
data/z88-13.0.0+dfsg2/src/z88i1.c:87:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char co1[10] = "z88o1.txt";
data/z88-13.0.0+dfsg2/src/z88i2.c:86:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cdyn[8] = "z88.dyn";
data/z88-13.0.0+dfsg2/src/z88i2.c:87:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cl2[10] = "z88i2.log";
data/z88-13.0.0+dfsg2/src/z88i2.c:88:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ci2[10] = "z88i2.txt";
data/z88-13.0.0+dfsg2/src/z88i2.c:89:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ci4[10] = "z88i4.txt";
data/z88-13.0.0+dfsg2/src/z88i2.c:90:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ci5[10] = "z88i5.txt";
data/z88-13.0.0+dfsg2/src/z88i2.c:91:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char c1y[10] = "z88o1.bny";
data/z88-13.0.0+dfsg2/src/z88i2.c:92:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char c3y[10] = "z88o3.bny";
data/z88-13.0.0+dfsg2/src/z88i2.c:93:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char c4y[10] = "z88o4.bny";
data/z88-13.0.0+dfsg2/src/z88i2.c:94:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char co1[10] = "z88o1.txt";
data/z88-13.0.0+dfsg2/src/z88i2.c:95:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char co2[10] = "z88o2.txt";
data/z88-13.0.0+dfsg2/src/z88i2.c:186:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cflag[10],cflagul[10];
data/z88-13.0.0+dfsg2/src/z88n.c:80:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cdyn[8] = "z88.dyn";
data/z88-13.0.0+dfsg2/src/z88n.c:81:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char clgd[9] = "z88n.log";
data/z88-13.0.0+dfsg2/src/z88n.c:82:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cni[10] = "z88ni.txt";
data/z88-13.0.0+dfsg2/src/z88n.c:83:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ci1[10] = "z88i1.txt";
data/z88-13.0.0+dfsg2/src/z88o.c:150:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char      CF_GRAFICS[128];
data/z88-13.0.0+dfsg2/src/z88o.c:306:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cline[256];
data/z88-13.0.0+dfsg2/src/z88o.c:308:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char  cdyn[8]   = "z88.dyn";
data/z88-13.0.0+dfsg2/src/z88o.c:309:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char  clgd[12]  = "z88o.log";
data/z88-13.0.0+dfsg2/src/z88o.c:310:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char  cstrn[128]= "z88i1.txt";
data/z88-13.0.0+dfsg2/src/z88o.c:311:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char  ci2[10]   = "z88i2.txt";
data/z88-13.0.0+dfsg2/src/z88o.c:312:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char  ci5[10]   = "z88i5.txt";
data/z88-13.0.0+dfsg2/src/z88o.c:313:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char  co2[10]   = "z88o2.txt";
data/z88-13.0.0+dfsg2/src/z88o.c:314:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char  co5[10]   = "z88o5.txt";
data/z88-13.0.0+dfsg2/src/z88o.c:315:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char  co8[10]   = "z88o8.txt";
data/z88-13.0.0+dfsg2/src/z88o.c:317:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char  CBROWSER[128],CPREFIX[128];
data/z88-13.0.0+dfsg2/src/z88o.c:318:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char  CPANGO_FONT[64],CPANGO_SIZE[32];
data/z88-13.0.0+dfsg2/src/z88o.c:320:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char  cfname[256];
data/z88-13.0.0+dfsg2/src/z88o.c:321:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char  ctname[256];
data/z88-13.0.0+dfsg2/src/z88o.c:326:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cstore[256];
data/z88-13.0.0+dfsg2/src/z88o.c:327:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cbcall[128];
data/z88-13.0.0+dfsg2/src/z88o.c:328:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cbpref[128];
data/z88-13.0.0+dfsg2/src/z88o.c:329:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cbhelp[512];
data/z88-13.0.0+dfsg2/src/z88o.c:330:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cmess [512];
data/z88-13.0.0+dfsg2/src/z88o.c:331:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cbytes[128];
data/z88-13.0.0+dfsg2/src/z88o.c:362:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char      cstring[256];
data/z88-13.0.0+dfsg2/src/z88o.c:465:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Info");
data/z88-13.0.0+dfsg2/src/z88o.c:466:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"About");
data/z88-13.0.0+dfsg2/src/z88o.c:470:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Hilfe");
data/z88-13.0.0+dfsg2/src/z88o.c:471:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Help");
data/z88-13.0.0+dfsg2/src/z88o.c:476:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Ende");
data/z88-13.0.0+dfsg2/src/z88o.c:477:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Quit");
data/z88-13.0.0+dfsg2/src/z88o.c:483:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Datei");
data/z88-13.0.0+dfsg2/src/z88o.c:484:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"File");
data/z88-13.0.0+dfsg2/src/z88o.c:488:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Strukturfile angeben,Z88I1.TXT ist Default");
data/z88-13.0.0+dfsg2/src/z88o.c:489:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Choose Structure File,Z88I1.TXT is Default");
data/z88-13.0.0+dfsg2/src/z88o.c:495:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Autoskalieren - Struktur einpassen");
data/z88-13.0.0+dfsg2/src/z88o.c:496:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"AutoScale - fit structure");
data/z88-13.0.0+dfsg2/src/z88o.c:499:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"* Tastatur / Maus");
data/z88-13.0.0+dfsg2/src/z88o.c:500:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"* Keyboard / Mouse");
data/z88-13.0.0+dfsg2/src/z88o.c:504:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Zoom-Schieben-Rotieren ueber Tastatur oder Maus");
data/z88-13.0.0+dfsg2/src/z88o.c:505:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Zoom-Pan-Rotate via Keyboard or Mouse");
data/z88-13.0.0+dfsg2/src/z88o.c:510:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"* unverformt");
data/z88-13.0.0+dfsg2/src/z88o.c:511:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"* undeflected");
data/z88-13.0.0+dfsg2/src/z88o.c:515:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Zeige unverformte Struktur");
data/z88-13.0.0+dfsg2/src/z88o.c:516:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Show undeflected Structure");
data/z88-13.0.0+dfsg2/src/z88o.c:519:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"verformt");
data/z88-13.0.0+dfsg2/src/z88o.c:520:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"deflected");
data/z88-13.0.0+dfsg2/src/z88o.c:524:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Zeige verformte Struktur");
data/z88-13.0.0+dfsg2/src/z88o.c:525:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Show deflected Structure");
data/z88-13.0.0+dfsg2/src/z88o.c:530:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"* Licht");
data/z88-13.0.0+dfsg2/src/z88o.c:531:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"* Light");
data/z88-13.0.0+dfsg2/src/z88o.c:535:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Licht an, auf Wunsch Anzeige der Randbedingungen");
data/z88-13.0.0+dfsg2/src/z88o.c:536:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Light on, show Boundary Conditions on request");
data/z88-13.0.0+dfsg2/src/z88o.c:542:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verdeckte Linien (nur 3D), auf Wunsch Anzeige der Randbedingungen");
data/z88-13.0.0+dfsg2/src/z88o.c:543:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Hidden Line (3D only), show Boundary Conditions on request");
data/z88-13.0.0+dfsg2/src/z88o.c:549:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Wireframe, auf Wunsch Anzeige der Randbedingungen");
data/z88-13.0.0+dfsg2/src/z88o.c:550:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Wireframe, show Boundary Conditions on request");
data/z88-13.0.0+dfsg2/src/z88o.c:553:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen Eckknoten");
data/z88-13.0.0+dfsg2/src/z88o.c:554:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses Corner Nodes");
data/z88-13.0.0+dfsg2/src/z88o.c:558:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Vergleichsspannungen (GEH,NH,SH: abhaengig von Z88D) in den Eckknoten");
data/z88-13.0.0+dfsg2/src/z88o.c:559:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Reduced Stresses (v.Mises,Rankine,Tresca:depending from Z88D) in corner nodes");
data/z88-13.0.0+dfsg2/src/z88o.c:562:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen pro Element");
data/z88-13.0.0+dfsg2/src/z88o.c:563:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses per Element");
data/z88-13.0.0+dfsg2/src/z88o.c:567:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Vergleichsspannungen (GEH,NH,SH: abhaengig von Z88D) pro Element gemittelt");
data/z88-13.0.0+dfsg2/src/z88o.c:568:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Reduced Stresses (v.Mises,Rankine,Tresca:depending from Z88D),mean values per Element");
data/z88-13.0.0+dfsg2/src/z88o.c:571:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Spannungen Gausspunkte");
data/z88-13.0.0+dfsg2/src/z88o.c:572:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Stresses Gauss Points");
data/z88-13.0.0+dfsg2/src/z88o.c:576:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Vergleichsspannungen (GEH,NH,SH: abhaengig von Z88D) -nur unverformte Struktur- in den Gausspunkten");
data/z88-13.0.0+dfsg2/src/z88o.c:577:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Reduced Stresses (v.Mises,Rankine,Tresca:depending from Z88D) -undeflected Structure only- in Gauss Points");
data/z88-13.0.0+dfsg2/src/z88o.c:580:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen X");
data/z88-13.0.0+dfsg2/src/z88o.c:581:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections X");
data/z88-13.0.0+dfsg2/src/z88o.c:585:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Zeige X-Verschiebungen");
data/z88-13.0.0+dfsg2/src/z88o.c:586:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Show X Displacements");
data/z88-13.0.0+dfsg2/src/z88o.c:589:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen Y");
data/z88-13.0.0+dfsg2/src/z88o.c:590:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections Y");
data/z88-13.0.0+dfsg2/src/z88o.c:594:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Zeige Y-Verschiebungen");
data/z88-13.0.0+dfsg2/src/z88o.c:595:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Show Y Displacements");
data/z88-13.0.0+dfsg2/src/z88o.c:598:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen Z");
data/z88-13.0.0+dfsg2/src/z88o.c:599:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections Z");
data/z88-13.0.0+dfsg2/src/z88o.c:603:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Zeige Z-Verschiebungen");
data/z88-13.0.0+dfsg2/src/z88o.c:604:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Show Z Displacements");
data/z88-13.0.0+dfsg2/src/z88o.c:609:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Zeige die Randbedingungen");
data/z88-13.0.0+dfsg2/src/z88o.c:610:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Show Boundary Conditions");
data/z88-13.0.0+dfsg2/src/z88o.c:614:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Zeige Randbedingungen ja/nein (nur Licht/Hidden Line/Wireframe)");
data/z88-13.0.0+dfsg2/src/z88o.c:615:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Show Boundary Conditions yes/no (Light/hidden Line/Wireframe only)");
data/z88-13.0.0+dfsg2/src/z88o.c:618:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Zeige Koordinatensystem");
data/z88-13.0.0+dfsg2/src/z88o.c:619:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Show Coordinate System");
data/z88-13.0.0+dfsg2/src/z88o.c:623:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Zeige Koordinatensystem ja/nein");
data/z88-13.0.0+dfsg2/src/z88o.c:624:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Show Coordinate System yes/no");
data/z88-13.0.0+dfsg2/src/z88o.c:672:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"keine Labels");
data/z88-13.0.0+dfsg2/src/z88o.c:673:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"No Labels");
data/z88-13.0.0+dfsg2/src/z88o.c:677:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Knoten");
data/z88-13.0.0+dfsg2/src/z88o.c:678:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Nodes");
data/z88-13.0.0+dfsg2/src/z88o.c:682:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Elemente");
data/z88-13.0.0+dfsg2/src/z88o.c:683:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Elements"); 
data/z88-13.0.0+dfsg2/src/z88o.c:687:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Alles labeln");
data/z88-13.0.0+dfsg2/src/z88o.c:688:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Label all");
data/z88-13.0.0+dfsg2/src/z88o.c:700:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Faktoren");
data/z88-13.0.0+dfsg2/src/z88o.c:701:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Factors");
data/z88-13.0.0+dfsg2/src/z88o.c:708:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Verschiebungen");
data/z88-13.0.0+dfsg2/src/z88o.c:709:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Deflections");
data/z88-13.0.0+dfsg2/src/z88o.c:713:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Rotationen 3D");
data/z88-13.0.0+dfsg2/src/z88o.c:714:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Rotations 3D");
data/z88-13.0.0+dfsg2/src/z88o.c:718:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Z-Limit zum Betrachter");
data/z88-13.0.0+dfsg2/src/z88o.c:719:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Z limit towards you");
data/z88-13.0.0+dfsg2/src/z88o.c:730:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Randbedingungen");
data/z88-13.0.0+dfsg2/src/z88o.c:731:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Boundary Conditions");
data/z88-13.0.0+dfsg2/src/z88o.c:738:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"RB nicht zeigen");
data/z88-13.0.0+dfsg2/src/z88o.c:739:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Don't show BCs");
data/z88-13.0.0+dfsg2/src/z88o.c:743:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"RB zeigen");
data/z88-13.0.0+dfsg2/src/z88o.c:744:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Show BCs");
data/z88-13.0.0+dfsg2/src/z88o.c:754:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"nur einzelne RB zeigen");
data/z88-13.0.0+dfsg2/src/z88o.c:755:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Only show single BC");
data/z88-13.0.0+dfsg2/src/z88o.c:770:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"alle RB");
data/z88-13.0.0+dfsg2/src/z88o.c:771:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"all the BCs");
data/z88-13.0.0+dfsg2/src/z88o.c:775:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"nur U1=UX=0");
data/z88-13.0.0+dfsg2/src/z88o.c:776:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"only U1=UX=0");
data/z88-13.0.0+dfsg2/src/z88o.c:780:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"nur U2=UY=0");
data/z88-13.0.0+dfsg2/src/z88o.c:781:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"only U2=UY=0");
data/z88-13.0.0+dfsg2/src/z88o.c:785:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"nur U3=UZ=0");
data/z88-13.0.0+dfsg2/src/z88o.c:786:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"only U3=UZ=0");
data/z88-13.0.0+dfsg2/src/z88o.c:790:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"nur U4=RotX=0");
data/z88-13.0.0+dfsg2/src/z88o.c:791:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"only U4=RotX=0");
data/z88-13.0.0+dfsg2/src/z88o.c:795:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"nur U5=RotY=0");
data/z88-13.0.0+dfsg2/src/z88o.c:796:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"only U5=RotY=0");
data/z88-13.0.0+dfsg2/src/z88o.c:800:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"nur U6=RotZ=0");
data/z88-13.0.0+dfsg2/src/z88o.c:801:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"only U6=RotZ=0");
data/z88-13.0.0+dfsg2/src/z88o.c:805:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"nur U vorgegeben");
data/z88-13.0.0+dfsg2/src/z88o.c:806:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"only U given");
data/z88-13.0.0+dfsg2/src/z88o.c:810:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"nur Oberflaechenlasten");
data/z88-13.0.0+dfsg2/src/z88o.c:811:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"only Surface Loads");
data/z88-13.0.0+dfsg2/src/z88o.c:815:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"nur Kraefte X");
data/z88-13.0.0+dfsg2/src/z88o.c:816:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"only Forces X");
data/z88-13.0.0+dfsg2/src/z88o.c:820:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"nur Kraefte Y");
data/z88-13.0.0+dfsg2/src/z88o.c:821:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"only Forces Y");
data/z88-13.0.0+dfsg2/src/z88o.c:825:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"nur Kraefte Z");
data/z88-13.0.0+dfsg2/src/z88o.c:826:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"only Forces Z");
data/z88-13.0.0+dfsg2/src/z88o.c:846:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Groesse Gausspt.");
data/z88-13.0.0+dfsg2/src/z88o.c:847:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Size Gausspt.");
data/z88-13.0.0+dfsg2/src/z88o.c:866:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Netz ueber Spannungen");
data/z88-13.0.0+dfsg2/src/z88o.c:867:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Mesh over Stresses");
data/z88-13.0.0+dfsg2/src/z88o.c:874:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Netz ueber Spannungen nein");
data/z88-13.0.0+dfsg2/src/z88o.c:875:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Mesh over Stresses no");
data/z88-13.0.0+dfsg2/src/z88o.c:879:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 1) strcpy(cstring,"Netz ueber Spannungen ja");
data/z88-13.0.0+dfsg2/src/z88o.c:880:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
if(LANG == 2) strcpy(cstring,"Mesh over Stresses yes");
data/z88-13.0.0+dfsg2/src/z88tx.c:160:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
fdxf= fopen(cxx,"w");
data/z88-13.0.0+dfsg2/src/z88v.c:84:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cdyn[8] = "z88.dyn";
data/z88-13.0.0+dfsg2/src/z88v.c:85:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char clgd[9] = "z88v.log";
data/z88-13.0.0+dfsg2/src/z88v.c:105:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char      cdatei[10];
data/z88-13.0.0+dfsg2/src/z88v.c:196:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(cdatei,"z88ni.txt");
data/z88-13.0.0+dfsg2/src/z88v.c:197:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fdatei= fopen(cdatei,"r");
data/z88-13.0.0+dfsg2/src/z88v.c:203:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(cdatei,"z88i1.txt");
data/z88-13.0.0+dfsg2/src/z88v.c:204:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fdatei= fopen(cdatei,"r");
data/z88-13.0.0+dfsg2/src/z88v.c:209:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(cdatei,"z88i2.txt");
data/z88-13.0.0+dfsg2/src/z88v.c:210:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fdatei= fopen(cdatei,"r");
data/z88-13.0.0+dfsg2/src/z88v.c:215:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(cdatei,"z88i3.txt");
data/z88-13.0.0+dfsg2/src/z88v.c:216:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fdatei= fopen(cdatei,"r");
data/z88-13.0.0+dfsg2/src/z88v.c:221:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(cdatei,"z88i4.txt");
data/z88-13.0.0+dfsg2/src/z88v.c:222:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fdatei= fopen(cdatei,"r");
data/z88-13.0.0+dfsg2/src/z88v.c:227:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(cdatei,"z88.dyn");
data/z88-13.0.0+dfsg2/src/z88v.c:231:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(cdatei,"z88i5.txt");
data/z88-13.0.0+dfsg2/src/z88v.c:232:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fdatei= fopen(cdatei,"r");
data/z88-13.0.0+dfsg2/src/z88x.c:86:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cdyn[8] = "z88.dyn";
data/z88-13.0.0+dfsg2/src/z88x.c:87:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char clgd[9] = "z88x.log";
data/z88-13.0.0+dfsg2/src/z88x.c:88:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ci1[10] = "z88i1.txt";
data/z88-13.0.0+dfsg2/src/z88x.c:89:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ci2[10] = "z88i2.txt";
data/z88-13.0.0+dfsg2/src/z88x.c:90:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ci3[10] = "z88i3.txt";
data/z88-13.0.0+dfsg2/src/z88x.c:91:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ci5[10] = "z88i5.txt";
data/z88-13.0.0+dfsg2/src/z88x.c:92:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cni[10] = "z88ni.txt";
data/z88-13.0.0+dfsg2/src/z88x.c:93:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cxx[10] = "z88x.dxf";
data/z88-13.0.0+dfsg2/src/z88x.c:150:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cflag[10];
data/z88-13.0.0+dfsg2/src/z88x.c:164:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cflagul[10], cftexts[10], cfts[10];
data/z88-13.0.0+dfsg2/src/cb88c.c:75:1:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:183:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:211:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:239:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:267:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:295:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:323:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:351:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:381:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:421:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:451:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:481:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:511:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:541:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:571:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:601:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:631:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:661:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:691:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:721:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:751:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:779:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:807:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:835:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:863:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:891:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:919:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:947:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:975:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:1003:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:1031:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:1059:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88c.c:1087:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(command," ");
data/z88-13.0.0+dfsg2/src/cb88o.c:398:1:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
strcat(command," ");
data/z88-13.0.0+dfsg2/src/dnas88.c:145:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
while((i= fgetc(fpro)) != EOF)
data/z88-13.0.0+dfsg2/src/m15.c:87:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:94:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:101:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:108:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:115:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:122:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:129:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:136:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:143:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:150:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:157:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:171:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);	
data/z88-13.0.0+dfsg2/src/m15.c:180:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:188:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);	
data/z88-13.0.0+dfsg2/src/m15.c:196:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);			
data/z88-13.0.0+dfsg2/src/m15.c:206:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);	
data/z88-13.0.0+dfsg2/src/m15.c:215:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:224:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);	
data/z88-13.0.0+dfsg2/src/m15.c:268:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:339:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:363:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:393:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:427:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:462:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:490:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:518:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:578:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:623:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:688:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:761:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:769:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:777:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:785:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:793:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:801:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:809:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:817:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:825:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:833:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/m15.c:841:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring);
data/z88-13.0.0+dfsg2/src/nast88.c:145:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
while((i= fgetc(fpro)) != EOF)
data/z88-13.0.0+dfsg2/src/z88o.c:394:1:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
strcat(CF_GRAFICS," ");

ANALYSIS SUMMARY:

Hits = 1639
Lines analyzed = 73878 in approximately 2.88 seconds (25633 lines/second)
Physical Source Lines of Code (SLOC) = 45338
Hits@level = [0] 4061 [1]  77 [2] 1011 [3]   0 [4] 551 [5]   0
Hits@level+ = [0+] 5700 [1+] 1639 [2+] 1562 [3+] 551 [4+] 551 [5+]   0
Hits/KSLOC@level+ = [0+] 125.722 [1+] 36.1507 [2+] 34.4523 [3+] 12.1532 [4+] 12.1532 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.