Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/modules/NAMD/GlobalMasterAPBS.C Examining data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/modules/NAMD/GlobalMasterAPBS.h Examining data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c Examining data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.h Examining data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/wrapper.cpp Examining data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Cholesky/LDLT.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Cholesky/LLT.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Cholesky/LLT_MKL.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/CholmodSupport/CholmodSupport.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Array.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/ArrayBase.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/ArrayWrapper.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Assign.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Assign_MKL.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/BandMatrix.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Block.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/BooleanRedux.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/CommaInitializer.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/CoreIterators.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/CwiseBinaryOp.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/CwiseNullaryOp.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/CwiseUnaryOp.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/CwiseUnaryView.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/DenseBase.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/DenseCoeffsBase.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/DenseStorage.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Diagonal.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/DiagonalMatrix.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/DiagonalProduct.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Dot.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/EigenBase.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Flagged.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/ForceAlignedAccess.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Functors.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Fuzzy.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/GeneralProduct.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/GenericPacketMath.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/GlobalFunctions.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/IO.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Map.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MapBase.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Matrix.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MatrixBase.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/NestByValue.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/NoAlias.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/NumTraits.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/PermutationMatrix.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/PlainObjectBase.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/ProductBase.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Random.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Redux.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Ref.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Replicate.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/ReturnByValue.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Reverse.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Select.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/SelfAdjointView.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/SelfCwiseBinaryOp.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/SolveTriangular.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/StableNorm.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Stride.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Swap.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Transpose.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Transpositions.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/TriangularMatrix.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/VectorBlock.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/VectorwiseOp.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Visitor.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/arch/AltiVec/Complex.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/arch/AltiVec/PacketMath.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/arch/Default/Settings.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/arch/NEON/Complex.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/arch/NEON/PacketMath.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/arch/SSE/Complex.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/arch/SSE/MathFunctions.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/arch/SSE/PacketMath.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/CoeffBasedProduct.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/GeneralBlockPanelKernel.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/GeneralMatrixMatrix.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/GeneralMatrixMatrixTriangular.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/GeneralMatrixMatrixTriangular_MKL.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/GeneralMatrixMatrix_MKL.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/GeneralMatrixVector.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/GeneralMatrixVector_MKL.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/Parallelizer.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/SelfadjointMatrixMatrix.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/SelfadjointMatrixMatrix_MKL.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/SelfadjointMatrixVector.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/SelfadjointMatrixVector_MKL.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/SelfadjointProduct.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/SelfadjointRank2Update.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/TriangularMatrixMatrix.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/TriangularMatrixMatrix_MKL.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/TriangularMatrixVector.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/TriangularMatrixVector_MKL.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/TriangularSolverMatrix.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/TriangularSolverMatrix_MKL.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/TriangularSolverVector.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/BlasUtil.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/Constants.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/DisableStupidWarnings.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/ForwardDeclarations.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/MKL_support.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/Macros.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/Memory.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/Meta.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/NonMPL2.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/ReenableStupidWarnings.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/StaticAssert.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/XprHelper.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Block.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Cwise.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/CwiseOperators.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/AlignedBox.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/All.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/AngleAxis.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/Hyperplane.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/ParametrizedLine.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/Quaternion.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/Rotation2D.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/RotationBase.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/Scaling.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/Transform.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/Translation.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/LU.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Lazy.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/LeastSquares.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Macros.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/MathFunctions.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Memory.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Meta.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Minor.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/QR.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/SVD.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/TriangularSolver.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/VectorBlock.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/ComplexEigenSolver.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/ComplexSchur.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/ComplexSchur_MKL.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/EigenSolver.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/GeneralizedEigenSolver.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/GeneralizedSelfAdjointEigenSolver.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/HessenbergDecomposition.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/MatrixBaseEigenvalues.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/RealQZ.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/RealSchur.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/RealSchur_MKL.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/SelfAdjointEigenSolver.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/SelfAdjointEigenSolver_MKL.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/Tridiagonalization.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/AlignedBox.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/AngleAxis.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/EulerAngles.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/Homogeneous.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/Hyperplane.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/OrthoMethods.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/ParametrizedLine.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/Quaternion.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/Rotation2D.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/RotationBase.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/Scaling.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/Transform.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/Translation.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/Umeyama.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/arch/Geometry_SSE.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Householder/BlockHouseholder.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Householder/Householder.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Householder/HouseholderSequence.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/IterativeLinearSolvers/BasicPreconditioners.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/IterativeLinearSolvers/BiCGSTAB.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/IterativeLinearSolvers/ConjugateGradient.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/IterativeLinearSolvers/IncompleteLUT.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/IterativeLinearSolvers/IterativeSolverBase.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Jacobi/Jacobi.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/LU/Determinant.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/LU/FullPivLU.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/LU/Inverse.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/LU/PartialPivLU.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/LU/PartialPivLU_MKL.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/LU/arch/Inverse_SSE.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/MetisSupport/MetisSupport.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/OrderingMethods/Amd.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/OrderingMethods/Eigen_Colamd.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/OrderingMethods/Ordering.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/PaStiXSupport/PaStiXSupport.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/PardisoSupport/PardisoSupport.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/QR/ColPivHouseholderQR.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/QR/ColPivHouseholderQR_MKL.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/QR/FullPivHouseholderQR.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/QR/HouseholderQR.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/QR/HouseholderQR_MKL.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SPQRSupport/SuiteSparseQRSupport.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SVD/JacobiSVD.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SVD/JacobiSVD_MKL.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SVD/UpperBidiagonalization.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCholesky/SimplicialCholesky.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCholesky/SimplicialCholesky_impl.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/AmbiVector.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/CompressedStorage.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/ConservativeSparseSparseProduct.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/MappedSparseMatrix.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseBlock.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseColEtree.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseCwiseBinaryOp.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseCwiseUnaryOp.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseDenseProduct.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseDiagonalProduct.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseDot.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseFuzzy.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseMatrix.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseMatrixBase.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparsePermutation.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseProduct.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseRedux.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseSelfAdjointView.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseSparseProductWithPruning.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseTranspose.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseTriangularView.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseUtil.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseVector.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseView.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/TriangularSolver.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLUImpl.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_Memory.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_Structs.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_SupernodalMatrix.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_Utils.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_column_bmod.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_column_dfs.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_copy_to_ucol.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_gemm_kernel.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_heap_relax_snode.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_kernel_bmod.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_panel_bmod.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_panel_dfs.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_pivotL.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_pruneL.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_relax_snode.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseQR/SparseQR.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/StlSupport/StdDeque.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/StlSupport/StdList.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/StlSupport/StdVector.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/StlSupport/details.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SuperLUSupport/SuperLUSupport.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/UmfPackSupport/UmfPackSupport.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/misc/Image.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/misc/Kernel.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/misc/Solve.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/misc/SparseSolve.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/misc/blas.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/plugins/ArrayCwiseBinaryOps.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/plugins/ArrayCwiseUnaryOps.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/plugins/BlockMethods.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/plugins/CommonCwiseBinaryOps.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/plugins/CommonCwiseUnaryOps.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/plugins/MatrixCwiseBinaryOps.h Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/plugins/MatrixCwiseUnaryOps.h Examining data/apbs-3.0.0+dfsg1/apbs/src/apbs.h Examining data/apbs-3.0.0+dfsg1/apbs/src/fem/vcsm.c Examining data/apbs-3.0.0+dfsg1/apbs/src/fem/vcsm.h Examining data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c Examining data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.h Examining data/apbs-3.0.0+dfsg1/apbs/src/fem/vpee.c Examining data/apbs-3.0.0+dfsg1/apbs/src/fem/vpee.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/bemparm.c Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/bemparm.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/geoflowparm.c Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/geoflowparm.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vacc.c Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vacc.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vcap.c Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vcap.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vclist.c Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vclist.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vgreen.c Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vgreen.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vmatrix.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vpbe.c Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vpbe.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vstring.c Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vstring.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vunit.h Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c Examining data/apbs-3.0.0+dfsg1/apbs/src/main.c Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.h Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vmgrid.c Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vmgrid.h Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vopot.c Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vopot.h Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmg.c Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmg.h Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmgp.c Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmgp.h Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/buildAd.c Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/buildAd.h Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/buildBd.c Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/buildBd.h Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/buildGd.c Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/buildGd.h Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/buildPd.c Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/buildPd.h Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/cgd.c Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/cgd.h Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/gsd.c Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/gsd.h Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/matvecd.c Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/matvecd.h Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mgcsd.c Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mgcsd.h Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mgdrvd.c Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mgdrvd.h Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mgfasd.c Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mgfasd.h Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mgsubd.c Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mgsubd.h Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mikpckd.c Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mikpckd.h Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mlinpckd.c Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mlinpckd.h Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mypdec.c Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mypdec.h Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/newdrvd.c Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/newdrvd.h Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/newtond.c Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/newtond.h Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/powerd.c Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/powerd.h Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/smoothd.c Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/smoothd.h Examining data/apbs-3.0.0+dfsg1/apbs/src/routines.c Examining data/apbs-3.0.0+dfsg1/apbs/src/routines.h Examining data/apbs-3.0.0+dfsg1/apbs/tools/manip/born.c Examining data/apbs-3.0.0+dfsg1/apbs/tools/manip/coulomb.c Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/analysis.c Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/benchmark.c Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/del2dx.c Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/dx2mol.c Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/dx2uhbd.c Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/dxmath.c Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx.c Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mgmesh.c Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/multivalue.c Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/smooth.c Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/tensor2dx.c Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/uhbd_asc2bin.c Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/value.c Examining data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c Examining data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c Examining data/apbs-3.0.0+dfsg1/apbs/tools/windows/configuration headers/apbscfg.h Examining data/apbs-3.0.0+dfsg1/apbs/tools/windows/configuration headers/maloccf.h FINAL RESULTS: data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:826:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string, mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:829:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string,mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:832:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string,mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:835:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string,mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:839:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string,mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:844:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string,mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:850:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string,mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:854:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string,mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:859:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string,mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:866:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string,mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:873:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string,mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:875:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string,mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:881:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string,mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:886:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string, mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:894:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string, mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:904:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string, mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:912:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string, mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:920:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string, mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:927:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string, mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:934:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string, mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:938:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(string, "%swrite pot dx iapbs-pot-%d\n", string, getpid()); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:981:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string, mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:984:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string, mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:991:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string, mybuf); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:999:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string, mybuf); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:118:1: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(file_name_x,argv[1]); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:128:1: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(file_name_y,mid); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:135:1: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(file_name_z,mid); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:142:1: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(file_name_k,mid); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:149:1: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(file_name_c, mid); /* add in the extension */ data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:590:1: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(f1,ext); /* add back m.dx */ data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:632:1: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(f2,ext); /* add back m.dx */ data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:674:1: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(f3,ext); /* add back m.dx */ data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:716:1: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(f4,ext); /* add back m.dx */ data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:757:1: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(f5,ext); /* add back m.dx */ data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:794:1: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(f6, &file_name_c[6]); /* add the appropriate _ext.dx */ data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1084:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( mmtitle, "Sparse '%s' Matrix - Harwell-Boeing Format - '%s'", data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1113:13: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf( fp, ptrfmtstr, Ablock->IA[i] + (i+1) ); data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1127:13: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf( fp, indfmtstr, i+1); /* diagonal */ data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1133:17: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf( fp, indfmtstr, JA[jj] + 1 ); /* lower triangle */ data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1149:13: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf( fp, valfmtstr, D[i] ); data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1155:17: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf( fp, valfmtstr, L[jj] ); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:610:17: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:614:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:616:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tok, strnew); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:629:17: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:633:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:635:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tok, strnew); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:648:17: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:652:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:654:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tok, strnew); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:687:17: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:691:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:693:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tok, strnew); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:709:17: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:713:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:715:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tok, strnew); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:762:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:766:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:768:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tok, strnew); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:816:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:820:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:822:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tok, strnew); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:861:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:865:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:867:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tok, strnew); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:907:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:911:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:913:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tok, strnew); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:942:17: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:946:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:948:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tok, strnew); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:1141:24: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. } else if (sscanf(tok, "%s", name) == 1) { data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:3149:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(parm->map3dname, pbeparm->pbam_3dmapstem); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1122:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(thee->pbam_3dmapstem, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1154:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1158:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1160:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tok, strnew); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1196:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1200:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(str, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1202:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tok, strnew); data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:215:36: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (strlen(tok) < VMAX_ARGLEN) strcpy(atomName, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:233:36: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (strlen(tok) < VMAX_ARGLEN) strcpy(resName, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:772:51: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). if (Vstring_strcasecmp(endtag, "/") == 0) strcat(endtag, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c:195:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(thee->resName, resName); data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c:203:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(resName,thee->resName); data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c:210:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(thee->atomName, atomName); data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c:217:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(atomName,thee->atomName); data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:578:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define snprintf sprintf_s data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:619:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( buff, 1000, msg, arg ); \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:628:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( buff, 1000, msg, arg0, arg1 ); \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:637:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buff, 1000, msg, arg0, arg1, arg2); \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:661:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( buff, 1000, msg, arg0 ); \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:668:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( buff, 1000, msg, arg0, arg1 ); \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:675:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buff, 1000, msg, arg0, arg1, arg2); \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:711:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( buff, 1000, msg, arg ); \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:723:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( buff, 1000, msg, arg0, arg1 ); \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:745:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( buff, 1000, msg, arg ); \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:757:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( buff, 1000, msg, arg0, arg1 ); \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:793:25: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buff, 1000, msg, arg0); \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:811:25: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buff, 1000, msg, arg0, arg1); \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:842:25: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buff, 1000, msg, arg0); \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:857:25: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buff, 1000, msg, arg0, arg1); \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:882:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( buff, 1000, msg, arg ); \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:892:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( buff, 1000, msg, arg0, arg1); \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:910:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( buff, 1000, msg, arg ); \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:920:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( buff, 1000, msg, arg0, arg1); \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:362:51: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). if (Vstring_strcasecmp(endtag, "/") == 0) strcat(endtag, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:385:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(currResName, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:411:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(res->name, currResName); data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:413:15: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(atoms[i].resName, currResName); data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:510:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(currResName, atoms[0].resName); data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:513:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(currResName, atoms[i].resName); data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:531:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(res->name, atoms[0].resName); data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:537:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(res->name, atoms[i].resName); data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:577:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dest->atomName, thee->atomName); data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:578:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dest->resName, thee->resName); data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:593:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dest->name, thee->name); data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:634:15: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(atom->atomName, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:704:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(atom->resName, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:711:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(atom->atomName, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/vstring.c:134:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name,tok); data/apbs-3.0.0+dfsg1/apbs/src/main.c:359:9: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(output_path, "%s_%d", output_path, rank); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1144:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(header, data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1346:9: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(precFormat, Vprecision, xminPART, yminPART, zminPART); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1348:9: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(precFormat, Vprecision, hx, 0.0, 0.0); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1350:9: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(precFormat, Vprecision, 0.0, hy, 0.0); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1352:9: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(precFormat, Vprecision, 0.0, 0.0, hzed); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1407:9: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(precFormat, Vprecision, xmin, ymin, zmin); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1409:9: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(precFormat, Vprecision, hx, 0.0, 0.0); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1411:9: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(precFormat, Vprecision, 0.0, hy, 0.0); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1413:9: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(precFormat, Vprecision, 0.0, 0.0, hzed); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1585:4: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(precFormat, Vprecision, xminPART, yminPART, zminPART); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1588:4: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(precFormat, Vprecision, hx, 0.0, 0.0); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1591:4: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(precFormat, Vprecision, 0.0, hy, 0.0); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1594:4: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(precFormat, Vprecision, 0.0, 0.0, hzed); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1642:4: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(precFormat, Vprecision, xmin, ymin, zmin); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1645:4: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(precFormat, Vprecision, hx, 0.0, 0.0); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1648:4: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(precFormat, Vprecision, 0.0, hy, 0.0); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1651:4: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(precFormat, Vprecision, 0.0, 0.0, hzed); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1816:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(writematstem, "%s-PE%d", pbeparm->writematstem, rank); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1826:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(writematstem, "%s-PE%d", pbeparm->writematstem,nosh->proc_rank); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1828:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(writematstem, "%s", pbeparm->writematstem); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1840:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(outpath, "%s.%s", writematstem, "mat"); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2654:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(writestem, "%s-PE%d", pbeparm->writestem[i], rank); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2657:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(writestem, "%s-PE%d", pbeparm->writestem[i],nosh->proc_rank); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2659:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(writestem, "%s", pbeparm->writestem[i]); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2666:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(outpath, "%s.%s", writestem, "dx"); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2676:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(outpath, "%s.%s", writestem, "dxbin"); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2687:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(outpath, "%s.%s", writestem, "ucd"); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2694:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(outpath, "%s.%s", writestem, "mcsf"); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2701:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(outpath, "%s.%s", writestem, "grd"); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2711:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(outpath, "%s.%s", writestem, "dx.gz"); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2720:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(outpath, "%s.%s", writestem, "txt"); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4425:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(writestem, "%s-PE%d", pbeparm->writestem[i], rank); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4428:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(writestem, "%s-PE%d", pbeparm->writestem[i],nosh->proc_rank); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4430:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(writestem, "%s", pbeparm->writestem[i]); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4437:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(outpath, "%s.%s", writestem, "dx"); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4444:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(outpath, "%s.%s", writestem, "dxbin"); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4450:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(outpath, "%s.%s", writestem, "ucd"); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5545:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fname_tp, "msms.exe -if %s -prob %f -dens %f -of %s", data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5548:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fname_tp, "msms -if %s -prob %f -dens %f -of %s", data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5555:14: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. ierr = system(fname_tp); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx.c:485:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(outname,"%s",argv[i]); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:590:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(outname,argv[i++]); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:620:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fnams[*numfnams],argv[i++]); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/smooth.c:96:17: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. if (sscanf(argv[i], "--input=%s", inPath) == 1) gotInPath = 1; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/smooth.c:102:17: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. if (sscanf(argv[i], "--output=%s", outPath) == 1) gotOutPath = 1; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/uhbd_asc2bin.c:30:5: [4] (buffer) scanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. scanf("%s", flnm); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/uhbd_asc2bin.c:42:5: [4] (buffer) scanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. scanf("%s", newfile); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/uhbd_asc2bin.c:54:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(inFile, "%s", title); data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:634:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(r,name); data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:704:25: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define PyOS_snprintf _snprintf data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:706:25: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define PyOS_snprintf snprintf data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:723:9: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. res = vsnprintf(buf, sizeof(buf), fmt, ap); data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:455:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(r,name); data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:617:23: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define PyOS_snprintf snprintf data/apbs-3.0.0+dfsg1/apbs/tools/windows/configuration headers/maloccf.h:306:27: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define VDEBUGIO(str) fprintf(stderr,str) data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:433:56: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. template<typename Scalar> inline EIGEN_MATHFUNC_RETVAL(random, Scalar) random(const Scalar& x, const Scalar& y); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:433:72: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. template<typename Scalar> inline EIGEN_MATHFUNC_RETVAL(random, Scalar) random(const Scalar& x, const Scalar& y); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:434:56: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. template<typename Scalar> inline EIGEN_MATHFUNC_RETVAL(random, Scalar) random(); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:434:72: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. template<typename Scalar> inline EIGEN_MATHFUNC_RETVAL(random, Scalar) random(); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:526:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return Scalar(random(real(x), real(y)), data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:527:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. random(imag(x), imag(y))); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:532:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return Scalar(random<RealScalar>(), random<RealScalar>()); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:532:41: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return Scalar(random<RealScalar>(), random<RealScalar>()); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:537:30: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. inline EIGEN_MATHFUNC_RETVAL(random, Scalar) random(const Scalar& x, const Scalar& y) data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:537:46: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. inline EIGEN_MATHFUNC_RETVAL(random, Scalar) random(const Scalar& x, const Scalar& y) data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:539:30: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return EIGEN_MATHFUNC_IMPL(random, Scalar)::run(x, y); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:543:30: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. inline EIGEN_MATHFUNC_RETVAL(random, Scalar) random() data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:543:46: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. inline EIGEN_MATHFUNC_RETVAL(random, Scalar) random() data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:545:30: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return EIGEN_MATHFUNC_IMPL(random, Scalar)::run(); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:737:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return random<int>(0,1)==0 ? false : true; data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Random.h:20:68: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. inline const Scalar operator() (Index, Index = 0) const { return random<Scalar>(); } data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/MathFunctions.h:27:63: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. template<typename T> inline T ei_random () { return internal::random<T>(); } data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/MathFunctions.h:28:85: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. template<typename T> inline T ei_random (const T& x, const T& y) { return internal::random(x, y); } data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/RealQZ.h:440:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. x = internal::random<Scalar>(-1.0,1.0); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/RealQZ.h:441:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. y = internal::random<Scalar>(-1.0,1.0); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/RealQZ.h:442:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. z = internal::random<Scalar>(-1.0,1.0); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/AlignedBox.h:168:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. * internal::random<Scalar>(Scalar(0), Scalar(1)); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/AlignedBox.h:171:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r[d] = internal::random(m_min[d], m_max[d]); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/modules/NAMD/GlobalMasterAPBS.C:223:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[129]; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/modules/NAMD/GlobalMasterAPBS.C:231:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[129]; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/modules/NAMD/GlobalMasterAPBS.C:589:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(r_param, params->r_param, 9*sizeof(double)); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/modules/NAMD/GlobalMasterAPBS.C:772:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fd = fopen(path, "rt"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/modules/NAMD/GlobalMasterAPBS.C:777:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[200]; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:791:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *setupString(double r_param[9], int i_param[25], double grid[3], data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:798:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[MAX_BUF_SIZE]; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:799:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char mybuf[MAX_BUF_SIZE]; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:802:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(string, "read\n mol pqr ion.pqr\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:805:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "charge dx iapbs-charge.dx\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:808:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "kappa dx iapbs-kappa.dx\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:811:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "diel dx iapbs-dielx.dx iapbs-diely.dx iapbs-dielz.dx\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:814:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "pot dx iapbs-pot.dx\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:816:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "end\n\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:819:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "elec name elec\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:821:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 0: sprintf(mybuf, "mg-manual\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:822:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 1: sprintf(mybuf, "mg-auto\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:823:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 2: sprintf(mybuf, "mg-para\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:828:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mybuf, "dime %i %i %i\n", dime[0], dime[1], dime[2]); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:831:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mybuf, "grid %.3f %.3f %.3f\n", grid[0], grid[1], grid[2]); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:834:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mybuf, "# nlev %i\n", i_param[1]); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:838:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mybuf, "glen %.3f %.3f %.3f\n", glen[0], glen[1], glen[2]); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:843:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mybuf, "gcent %.3f %.3f %.3f\n", center[0], center[1], center[2]); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:846:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "gcent mol 1\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:849:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mybuf, "cglen %.3f %.3f %.3f\n", cglen[0], cglen[1], cglen[2]); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:853:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mybuf, "fglen %.3f %.3f %.3f\n", fglen[0], fglen[1], fglen[2]); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:857:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mybuf, "cgcent %.3f %.3f %.3f\n", data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:861:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "cgcent mol 1\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:864:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mybuf, "fgcent %.3f %.3f %.3f\n", data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:868:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "fgcent mol 1\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:872:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mybuf, "pdime %i %i %i\n", pdime[0], pdime[1], pdime[2]); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:874:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mybuf, "ofrac %.3f\n", *ofrac); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:879:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mybuf, "ion charge %.3f conc %.3f radius %.3f\n", data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:883:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mybuf, "pdie %.3f \nsdie %.3f\nsrad %.3f\nswin %.3f\n\ data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:889:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 0: sprintf(mybuf, "chgm spl0\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:890:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 1: sprintf(mybuf, "chgm spl2\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:891:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 2: sprintf(mybuf, "chgm spl4\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:896:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 0: sprintf(mybuf, "lpbe\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:897:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 1: sprintf(mybuf, "npbe\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:898:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 2: sprintf(mybuf, "lrpbe\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:899:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 3: sprintf(mybuf, "nrpbe\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:900:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 4: sprintf(mybuf, "smpbe vol %.3f size %.3f\n", data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:906:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 0: sprintf(mybuf, "bcfl zero\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:907:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 1: sprintf(mybuf, "bcfl sdh\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:908:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 2: sprintf(mybuf, "bcfl mdh\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:909:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 4: sprintf(mybuf, "bcfl focus\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:914:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 0: sprintf(mybuf, "srfm mol\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:915:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 1: sprintf(mybuf, "srfm smol\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:916:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 2: sprintf(mybuf, "srfm spl2\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:917:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 3: sprintf(mybuf, "srfm spl4\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:922:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 0: sprintf(mybuf, "calcenergy no\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:923:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 1: sprintf(mybuf, "calcenergy total\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:924:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 2: sprintf(mybuf, "calcenergy comps\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:929:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 0: sprintf(mybuf, "calcforce no\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:930:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 1: sprintf(mybuf, "calcforce total\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:931:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 2: sprintf(mybuf, "calcforce comps\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:941:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "write charge dx iapbs-charge\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:944:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "write smol dx iapbs-smol\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:947:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "write kappa dx iapbs-kappa\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:950:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "write dielx dx iapbs-dielx\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:951:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "write diely dx iapbs-diely\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:952:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "write dielz dx iapbs-dielz\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:955:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "write atompot dx iapbs-atompot\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:960:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "usemap charge 1\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:963:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "usemap kappa 1\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:966:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "usemap diel 1\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:969:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "usemap pot 1\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:971:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "end\n\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:976:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "apolar name npolar\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:977:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "bconc 0.0\npress 0.0\ndpos 0.2\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:978:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "mol 1\nsrfm sacc\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:979:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "grid 0.2 0.2 0.2\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:980:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mybuf, "gamma %.3f\n", r_param[6]); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:982:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mybuf, "srad %.3f\nswin %.3f\ntemp %.3f\nsdens %.3f\n", \ data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:987:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 1: sprintf(mybuf, "calcenergy total\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:988:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 2: sprintf(mybuf, "calcenergy comps\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:994:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 0: sprintf(mybuf, "calcforce no\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:995:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 1: sprintf(mybuf, "calcforce total\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:996:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 2: sprintf(mybuf, "calcforce comps\n"); break; data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:1001:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "end\n\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:1006:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "print elecEnergy elec end\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:1008:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "print apolEnergy npolar end\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:1013:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "print elecForce elec end\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:1016:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "print apolForce npolar end\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:1020:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "\nquit\n"); data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.h:254:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *setupString(double r_param[9], int i_param[25], double grid[3], data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:108:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[100], file_name_x[20], file_name_y[20], file_name_z[20]; data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:109:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file_name_k[20], file_name_c[20]; data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:110:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char f1[21], f2[21], f3[21], f4[21], f5[21], f6[21]; data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:111:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ext[5]="m.dx", mid[21]; data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:130:1: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(file_name_y,".dx"); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:137:1: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(file_name_z,".dx"); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:144:1: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(file_name_k,".dx"); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:151:1: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(file_name_c,".dx"); /* add back .dx */ data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:173:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(file_name_x,"r"); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:282:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(file_name_y,"r"); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:342:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(file_name_z,"r"); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:407:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(file_name_k,"r"); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:472:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(file_name_c,"r"); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:591:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen(f1,"w"); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:633:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen(f2,"w"); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:675:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen(f3,"w"); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:717:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen(f4,"w"); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:758:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen(f5,"w"); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:793:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (f6,"change_map"); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:795:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen(f6,"w"); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/Memory.h:174:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. std::memcpy(newptr, ptr, (std::min)(size,old_size)); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/Memory.h:509:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(target, start, std::ptrdiff_t(end)-std::ptrdiff_t(start)); } data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/AmbiVector.h:93:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newBuffer, m_buffer, copyElements * sizeof(ListEl)); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/CompressedStorage.h:54:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m_values, other.m_values, m_size * sizeof(Scalar)); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/CompressedStorage.h:55:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m_indices, other.m_indices, m_size * sizeof(Index)); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseBlock.h:148:14: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. std::memcpy(&newdata.value(0), &m_matrix.data().value(0), start*sizeof(Scalar)); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseBlock.h:149:14: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. std::memcpy(&newdata.index(0), &m_matrix.data().index(0), start*sizeof(Index)); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseBlock.h:151:14: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. std::memcpy(&newdata.value(start), &tmp.data().value(0), nnz*sizeof(Scalar)); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseBlock.h:152:14: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. std::memcpy(&newdata.index(start), &tmp.data().index(0), nnz*sizeof(Index)); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseBlock.h:154:14: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. std::memcpy(&newdata.value(start+nnz), &matrix.data().value(end), tail_size*sizeof(Scalar)); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseBlock.h:155:14: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. std::memcpy(&newdata.index(start+nnz), &matrix.data().index(end), tail_size*sizeof(Index)); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseBlock.h:169:14: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. std::memcpy(&matrix.data().value(start), &tmp.data().value(0), nnz*sizeof(Scalar)); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseBlock.h:170:14: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. std::memcpy(&matrix.data().index(start), &tmp.data().index(0), nnz*sizeof(Index)); data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseMatrix.h:714:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m_outerIndex, other.m_outerIndex, (m_outerSize+1)*sizeof(Index)); data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1037:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mmtitle[72]; data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1073:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ptrfmt,"(%dI%d)",nptrline,numZdigits+1); data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1074:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ptrfmtstr,"%%%dd",numZdigits+1); data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1075:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(indfmt,"(%dI%d)",nindline,nrowdigits+1); data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1076:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(indfmtstr,"%%%dd",nrowdigits+1); data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1089:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen( fname, "w" ); data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:239:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:270:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:288:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:310:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:329:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:348:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:367:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:386:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:439:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:492:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:511:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:530:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:559:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:577:55: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VPUBLIC Vrc_Codes APOLparm_parseToken(APOLparm *thee, char tok[VMAX_BUFSIZE], data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.h:250:56: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VEXTERNC Vrc_Codes APOLparm_parseToken(APOLparm *thee, char tok[VMAX_BUFSIZE], data/apbs-3.0.0+dfsg1/apbs/src/generic/bemparm.c:212:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/bemparm.c:235:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/bemparm.c:258:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/bemparm.c:281:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/bemparm.c:310:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/bemparm.c:332:53: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VPUBLIC Vrc_Codes BEMparm_parseToken(BEMparm *thee, char tok[VMAX_BUFSIZE], data/apbs-3.0.0+dfsg1/apbs/src/generic/bemparm.h:177:59: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VEXTERNC Vrc_Codes BEMparm_parseToken(BEMparm *thee, char tok[VMAX_BUFSIZE], data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:202:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:226:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:248:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:278:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:305:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:335:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:354:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:374:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:393:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:412:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:431:53: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VPUBLIC Vrc_Codes FEMparm_parseToken(FEMparm *thee, char tok[VMAX_BUFSIZE], data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.h:246:54: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VEXTERNC Vrc_Codes FEMparm_parseToken(FEMparm *thee, char tok[VMAX_BUFSIZE], data/apbs-3.0.0+dfsg1/apbs/src/generic/geoflowparm.c:144:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/geoflowparm.c:166:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/geoflowparm.c:188:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/geoflowparm.c:212:61: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VPUBLIC Vrc_Codes GEOFLOWparm_parseToken(GEOFLOWparm *thee, char tok[VMAX_BUFSIZE], data/apbs-3.0.0+dfsg1/apbs/src/generic/geoflowparm.h:158:67: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VEXTERNC Vrc_Codes GEOFLOWparm_parseToken(GEOFLOWparm *thee, char tok[VMAX_BUFSIZE], data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:417:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:448:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:499:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:518:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:541:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:572:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:603:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:618:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:670:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:701:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:732:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:784:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:836:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:874:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:894:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:919:51: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VPUBLIC Vrc_Codes MGparm_parseToken(MGparm *thee, char tok[VMAX_BUFSIZE], data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.h:357:57: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VEXTERNC Vrc_Codes MGparm_parseToken(MGparm *thee, char tok[VMAX_BUFSIZE], data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:520:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:600:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE], str[VMAX_BUFSIZE]="", strnew[VMAX_BUFSIZE]=""; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:677:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE], str[VMAX_BUFSIZE]="", strnew[VMAX_BUFSIZE]=""; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:741:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE], str[VMAX_BUFSIZE]="", strnew[VMAX_BUFSIZE]=""; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:795:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE], str[VMAX_BUFSIZE]="", strnew[VMAX_BUFSIZE]=""; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:841:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE], str[VMAX_BUFSIZE]="", strnew[VMAX_BUFSIZE]=""; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:886:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE], str[VMAX_BUFSIZE]="", strnew[VMAX_BUFSIZE]=""; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:932:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE], str[VMAX_BUFSIZE]="", strnew[VMAX_BUFSIZE]=""; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:972:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:1023:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:1024:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:1191:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:1317:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:1516:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:2391:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:2514:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:2851:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:2940:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:3054:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:3172:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:232:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char molpath[NOSH_MAXMOL][VMAX_ARGLEN]; /**< Paths to mol files */ data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:237:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parmpath[VMAX_ARGLEN]; /**< Paths to parm file */ data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:240:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dielXpath[NOSH_MAXMOL][VMAX_ARGLEN]; /**< Paths to x-shifted data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:242:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dielYpath[NOSH_MAXMOL][VMAX_ARGLEN]; /**< Paths to y-shifted data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:244:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dielZpath[NOSH_MAXMOL][VMAX_ARGLEN]; /**< Paths to z-shifted data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:248:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kappapath[NOSH_MAXMOL][VMAX_ARGLEN]; /**< Paths to kappa map files */ data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:251:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char potpath[NOSH_MAXMOL][VMAX_ARGLEN]; /**< Paths to potential map files */ data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:254:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chargepath[NOSH_MAXMOL][VMAX_ARGLEN]; /**< Paths to charge map files */ data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:257:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char meshpath[NOSH_MAXMOL][VMAX_ARGLEN]; /**< Paths to mesh files */ data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:267:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char elecname[NOSH_MAXCALC][VMAX_ARGLEN]; /**< Optional user-specified name data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:269:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char apolname[NOSH_MAXCALC][VMAX_ARGLEN]; /**< Optional user-specified name data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:254:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:273:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:291:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:312:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:338:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:353:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:373:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:393:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:446:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:460:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:479:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:551:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:634:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:662:55: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VPUBLIC Vrc_Codes PBAMparm_parseToken(PBAMparm *thee, char tok[VMAX_BUFSIZE], data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:115:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char runtype[CHR_MAXLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:119:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char runname[CHR_MAXLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:130:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char units[CHR_MAXLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:141:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char map3dname[CHR_MAXLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:145:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char grid2Dname[PBAMPARM_MAXWRITE][CHR_MAXLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:146:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char grid2Dax[PBAMPARM_MAXWRITE][CHR_MAXLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:152:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dxname[CHR_MAXLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:161:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char termcombine[CHR_MAXLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:165:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char moveType[PBAMPARM_MAXMOL][CHR_MAXLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:172:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char termnam[PBAMPARM_MAXWRITE][CHR_MAXLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:175:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char confil[PBAMPARM_MAXWRITE][CHR_MAXLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:181:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char xyzfil[PBAMPARM_MAXMOL][PBAMPARM_MAXWRITE][CHR_MAXLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:233:56: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VEXTERNC Vrc_Codes PBAMparm_parseToken(PBAMparm *thee, char tok[VMAX_BUFSIZE], data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:384:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:419:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[VMAX_BUFSIZE]; /* vol or size (keywords) */ data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:420:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[VMAX_BUFSIZE]; /* floating point value */ data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:475:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:560:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:561:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:653:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:672:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:691:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:710:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:781:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:800:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:819:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:838:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:896:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:949:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1006:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1026:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1045:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1064:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1085:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE], str[VMAX_BUFSIZE]="", strnew[VMAX_BUFSIZE]=""; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1179:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE], str[VMAX_BUFSIZE]="", strnew[VMAX_BUFSIZE]=""; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1215:47: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VPUBLIC int PBEparm_parseToken(PBEparm *thee, char tok[VMAX_BUFSIZE], data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.h:186:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char writestem[PBEPARM_MAXWRITE][VMAX_ARGLEN]; /**< File stem to write data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.h:195:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char writematstem[VMAX_ARGLEN]; /**< File stem to write mat */ data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.h:202:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pbam_3dmapstem[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.h:308:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE], /**< Token to parse */ data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c:168:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c:184:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c:205:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c:220:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c:234:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c:252:57: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VPUBLIC Vrc_Codes PBSAMparm_parseToken(PBSAMparm *thee, char tok[VMAX_BUFSIZE], data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.h:121:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char surffil[PBSAMPARM_MAXMOL][CHR_MAXLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.h:125:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char imatfil[PBSAMPARM_MAXMOL][CHR_MAXLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.h:129:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expfil[PBSAMPARM_MAXMOL][CHR_MAXLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.h:181:58: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VEXTERNC Vrc_Codes PBSAMparm_parseToken(PBSAMparm *thee, char tok[VMAX_BUFSIZE], data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:188:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:207:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char atomName[VMAX_ARGLEN]) { data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:209:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:225:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resName[VMAX_ARGLEN]) { data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:227:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:245:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:300:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:319:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:348:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char atomName[VMAX_ARGLEN], /* Set to atom name */ data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:349:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resName[VMAX_ARGLEN], /* Set to residue name */ data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:524:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:525:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char atomName[VMAX_ARGLEN], resName[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:616:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:617:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char atomName[VMAX_ARGLEN], resName[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:618:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chs[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:730:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:731:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char endtag[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c:182:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, thee, sizeof(Vatom)); data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c:192:44: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VPUBLIC void Vatom_setResName(Vatom *thee, char resName[VMAX_RECLEN]) { data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c:199:44: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VPUBLIC void Vatom_getResName(Vatom *thee, char resName[VMAX_RECLEN]) { data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c:207:45: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VPUBLIC void Vatom_setAtomName(Vatom *thee, char atomName[VMAX_RECLEN]) { data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c:214:45: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VPUBLIC void Vatom_getAtomName(Vatom *thee, char atomName[VMAX_RECLEN]) { data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.h:97:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resName[VMAX_RECLEN]; /**< Residue name from PDB/PQR file */ data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.h:98:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char atomName[VMAX_RECLEN]; /**< Atom name from PDB/PDR file */ data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.h:242:48: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VEXTERNC void Vatom_setResName(Vatom *thee, char resName[VMAX_RECLEN]); data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.h:250:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char atomName[VMAX_RECLEN] /**< Atom name */ data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.h:259:48: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VEXTERNC void Vatom_getResName(Vatom *thee, char resName[VMAX_RECLEN]); data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.h:267:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char atomName[VMAX_RECLEN] /**< Atom name */ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:618:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1000]; \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:627:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1000]; \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:636:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1000]; \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:660:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1000]; \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:667:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1000]; \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:674:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1000]; \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:710:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1000]; \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:722:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1000]; \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:744:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1000]; \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:756:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1000]; \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:792:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1000]; \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:810:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1000]; \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:841:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1000]; \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:856:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1000]; \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:881:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1000]; \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:891:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1000]; \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:909:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1000]; \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:919:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1000]; \ data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:242:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resName[VMAX_ARGLEN]) { data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:268:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resName[VMAX_ARGLEN], char atomName[VMAX_ARGLEN]) { data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:268:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resName[VMAX_ARGLEN], char atomName[VMAX_ARGLEN]) { data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:317:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char currResName[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:318:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:319:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char endtag[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:454:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char currResName[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:613:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:694:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.h:93:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char atomName[VMAX_ARGLEN]; /**< Atom name */ data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.h:94:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resName[VMAX_ARGLEN]; /**< Residue name */ data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.h:116:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[VMAX_ARGLEN]; /**< Residue name */ data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.h:291:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resName[VMAX_ARGLEN]); data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.h:305:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resName[VMAX_ARGLEN], char atomName[VMAX_ARGLEN]); data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.h:305:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resName[VMAX_ARGLEN], char atomName[VMAX_ARGLEN]); data/apbs-3.0.0+dfsg1/apbs/src/generic/vstring.c:132:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char checkchar[1]; data/apbs-3.0.0+dfsg1/apbs/src/generic/vstring.c:133:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/generic/vstring.c:223:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( wrap_str + k, str + i, line_len * sizeof( char ) ); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:80:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VPRIVATE char Vprecision[26]; data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:142:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(Vprecision,"%%12.%de %%12.%de %%12.%de", VGRID_DIGITS, data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:471:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:595:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:815:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:828:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fd = fopen(fname,"rb"); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1025:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[8196]; data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1026:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char footer[8196]; data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1027:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[80]; data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1030:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char precFormat[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1167:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(line, "%12.6e ", thee->data[u]); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1184:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(footer, "attribute \"dep\" string \"positions\"\n" \ data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1215:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char precFormat[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1467:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char precFormat[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1493:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fd = fopen(fname,"wb"); data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmg.c:87:44: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VPUBLIC void Vpmg_printColComp(Vpmg *thee, char path[72], char title[72], data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmg.c:87:59: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VPUBLIC void Vpmg_printColComp(Vpmg *thee, char path[72], char title[72], data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmg.c:88:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mxtype[3], int flag) { data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmg.c:11040:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). outFile = fopen(path, "w"); data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmg.h:787:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[72], /**< The file to which the matrix is to be written */ data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmg.h:788:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[72], /**< The title of the matrix */ data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmg.h:789:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mxtype[3], /**< The type of REAL-valued matrix, a 3-character data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1801:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char writematstem[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1802:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outpath[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1803:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mxtype[3]; data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1890:33: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *fname, data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1914:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). file = fopen(fname, "w"); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2123:55: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VPUBLIC int writedataXML(NOsh *nosh, Vcom *com, const char *fname, data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2148:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). file = fopen(fname, "w"); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2389:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char writestem[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2390:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outpath[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2391:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[72]; data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2434:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(title, "CHARGE DISTRIBUTION (e)"); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2448:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(title, "POTENTIAL (kT/e)"); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2462:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(title, data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2478:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(title, data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2494:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(title, "SOLVENT ACCESSIBILITY -- VAN DER WAALS"); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2508:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(title, data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2524:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(title, data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2539:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(title, "ENERGY DENSITY (kT/e/A)^2"); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2553:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(title, data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2568:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(title, data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2583:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(title, data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2598:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(title, data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2613:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(title, data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2628:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(title, data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2643:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(title, data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4306:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char writestem[VMAX_ARGLEN]; /**< @todo document */ data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4307:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outpath[VMAX_ARGLEN]; /**< @todo document */ data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5389:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fname_tp[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5515:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char xyzr[VMAX_ARGLEN], surf[VMAX_ARGLEN], outname[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5532:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp=fopen(xyzr, "w"); data/apbs-3.0.0+dfsg1/apbs/src/routines.h:368:57: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VEXTERNC int writedataFlat(NOsh *nosh, Vcom *com, const char *fname, data/apbs-3.0.0+dfsg1/apbs/src/routines.h:390:56: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VEXTERNC int writedataXML(NOsh *nosh, Vcom *com, const char *fname, data/apbs-3.0.0+dfsg1/apbs/tools/mesh/analysis.c:91:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char scalarPath[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/analysis.c:93:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char maskPath[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/benchmark.c:24:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char test_string[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/benchmark.c:25:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/benchmark.c:69:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(test_string, "integer %d double %4.3f exponential %12.5e\n", data/apbs-3.0.0+dfsg1/apbs/tools/mesh/del2dx.c:41:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/del2dx.c:72:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). pfile = fopen(inpath, "r+b"); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/del2dx.c:129:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). pfile = fopen(outpath, "w"); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/dxmath.c:40:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/dxmath.c:41:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/dxmath.c:42:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gridPath[DXM_MAXOP+1][VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx.c:45:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outname[80]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx.c:50:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(outname,"gridmerged.dx"); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx.c:244:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx.c:491:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (*pad) = atoi(argv[i]); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx.c:522:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (*nx) = atoi(argv[i]); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx.c:523:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (*ny) = atoi(argv[i+1]); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx.c:524:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (*nz) = atoi(argv[i+2]); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:20:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VPRIVATE int Char_parseARGV(int argc, char **argv, data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:24:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int *spec, char *outname, char fnams[MAX_INPUT_2][MAX_INPUT_PATH], int *numfnams, data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:24:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int *spec, char *outname, char fnams[MAX_INPUT_2][MAX_INPUT_PATH], int *numfnams, data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:107:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fnams[MAX_INPUT_2][MAX_INPUT_PATH]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:111:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outname[MAX_INPUT_PATH]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:126:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(outname,"gridmerged.dx"); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:431:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:564:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. VPRIVATE int Char_parseARGV(int argc, char **argv, data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:568:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int* spec, char *outname, char fnams[MAX_INPUT_2][MAX_INPUT_PATH], int *numfnams, data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:568:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int* spec, char *outname, char fnams[MAX_INPUT_2][MAX_INPUT_PATH], int *numfnams, data/apbs-3.0.0+dfsg1/apbs/tools/mesh/multivalue.c:130:27: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((inputFileStream = fopen(inputFileName,"r")) == NULL){ data/apbs-3.0.0+dfsg1/apbs/tools/mesh/multivalue.c:138:28: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((outputFileStream = fopen(outputFileName,"w")) == NULL){ data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:116:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int readTransform(char *path, double rotMat[3][3], double dispVec[3]) { data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:119:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tok[VMAX_BUFSIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:260:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char scalar1Path[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:262:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char scalar2Path[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:264:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char transformPath[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:266:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mask1Path[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:268:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mask2Path[VMAX_ARGLEN]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/smooth.c:67:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inPath[VMAX_BUFSIZE]; int gotInPath = 0; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/smooth.c:68:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outPath[VMAX_BUFSIZE]; int gotOutPath = 0; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/tensor2dx.c:59:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/tensor2dx.c:71:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nx = atoi(argv[1]); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/tensor2dx.c:72:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ny = atoi(argv[2]); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/tensor2dx.c:73:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nz = atoi(argv[3]); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/tensor2dx.c:93:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). pfile1 = fopen(origin,"r"); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/tensor2dx.c:94:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). pfile2 = fopen(data,"r"); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/tensor2dx.c:114:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). pfile3 = fopen(outpath, "w"); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/uhbd_asc2bin.c:16:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newfile[256]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/uhbd_asc2bin.c:17:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char flnm[256]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/uhbd_asc2bin.c:18:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[72]; data/apbs-3.0.0+dfsg1/apbs/tools/mesh/uhbd_asc2bin.c:32:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). inFile = fopen(flnm, "r"); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/uhbd_asc2bin.c:44:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). outFile = fopen(newfile, "wb"); data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:585:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char hex[17] = "0123456789abcdef"; data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:720:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[SWIG_PYBUFFER_SIZE * 2]; data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:1378:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result[SWIG_BUFFER_SIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:1699:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result[SWIG_BUFFER_SIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:1713:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result[SWIG_BUFFER_SIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:1724:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result[SWIG_BUFFER_SIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:1842:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pack, ptr, size); data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:1860:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, sobj->pack, size); data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:2366:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mesg[256]; data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:2707:22: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. *cptr = (char *)memcpy((char *)malloc((len + 1)*sizeof(char)), cstr, sizeof(char)*(len + 1)); data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:406:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char hex[17] = "0123456789abcdef"; data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:648:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result[SWIG_BUFFER_SIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:661:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result[SWIG_BUFFER_SIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:669:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result[SWIG_BUFFER_SIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:859:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result[SWIG_BUFFER_SIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:874:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result[SWIG_BUFFER_SIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:885:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result[SWIG_BUFFER_SIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:982:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pack, ptr, size); data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:997:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, self->pack, size); data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:1107:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mesg[256]; data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:1276:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result[SWIG_BUFFER_SIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:1309:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result[SWIG_BUFFER_SIZE]; data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:3093:48: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. obj = PyString_FromString((char *) constants[i].pvalue); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:123:3: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l=strlen(file_name_x); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:124:1: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(mid, &file_name_x[5], l - 3 - 5); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:126:1: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(file_name_y, "diely", 5); /* take off the .dx */ data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:133:1: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(file_name_z, "dielz", 5); /* take off the .dx */ data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:140:1: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(file_name_k, "kappa", 5); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:147:1: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(file_name_c, "charge", 6); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:186:1: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. fscanf(in, "%6s %1s %5s %13s %6s %i %i %i \n", s,s,s,s,s,&dim_x,&dim_y,&dim_z); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:187:1: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. fscanf(in, "%6s %f %f %f \n",s, &x0_x, &y0_x, &z0_x); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:188:1: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. fscanf(in, "%5s %f %f %f \n",s, &dx, &tmp, &tmp); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:189:1: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. fscanf(in, "%5s %f %f %f \n",s, &tmp, &dy, &tmp); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:190:1: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. fscanf(in, "%5s %f %f %f \n",s, &tmp, &tmp, &dz); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:192:1: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. fscanf(in, "%6s %i %5s %5s %4s %6s %4s %i %5s %i %4s %7s \n",s,&tmp,s,s,s,s,s,&tmp,s,&dim3,s,s); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:291:1: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. fscanf(in, "%6s %f %f %f \n",s, &x0_y, &y0_y, &z0_y); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:296:1: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. fscanf(in, "%6s %i %5s %5s %4s %6s %4s %i %5s %i %4s %7s \n",s,&tmp,s,s,s,s,s,&tmp,s, &tmp,s,s); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:351:1: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. fscanf(in, "%6s %f %f %f \n",s, &x0_z, &y0_z, &z0_z); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:356:1: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. fscanf(in, "%6s %i %5s %5s %4s %6s %4s %i %5s %i %4s %7s \n",s,&tmp,s,s,s,s,s,&tmp,s, &tmp,s,s); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:416:1: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. fscanf(in, "%6s %f %f %f \n",s, &x0, &y0, &z0); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:587:3: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l=strlen(file_name_x); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:588:1: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(f1, file_name_x, l-3); /* take off the .dx */ data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:629:3: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l=strlen(file_name_y); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:630:1: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(f2, file_name_y, l-3); /* take off the .dx */ data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:671:3: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l=strlen(file_name_z); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:672:1: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(f3, file_name_z, l-3); /* take off the .dx */ data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:713:3: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l=strlen(file_name_k); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:714:1: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(f4, file_name_k, l-3); /* take off the .dx */ data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:754:3: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l=strlen(file_name_c); data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:755:1: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(f5, file_name_c, l-3); /* take off the .dx */ data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:920:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bufsize = strlen(diriCubeString); data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:922:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, diriCubeString, VMAX_BUFSIZE); data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:926:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bufsize = strlen(neumCubeString); data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:929:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, neumCubeString, VMAX_BUFSIZE); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:608:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(strnew, ""); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:609:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (tok[strlen(tok)-1] != '"') { data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:611:17: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(str, " "); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:615:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:615:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:621:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->molpath[thee->nmol], tok, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:627:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(strnew, ""); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:628:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (tok[strlen(tok)-1] != '"') { data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:630:17: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(str, " "); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:634:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:634:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:640:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->molpath[thee->nmol], tok, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:646:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(strnew, ""); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:647:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (tok[strlen(tok)-1] != '"') { data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:649:17: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(str, " "); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:653:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:653:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:659:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->molpath[thee->nmol], tok, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:685:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(strnew, ""); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:686:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (tok[strlen(tok)-1] != '"') { data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:688:17: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(str, " "); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:692:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:692:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:701:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->parmpath, tok, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:707:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(strnew, ""); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:708:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (tok[strlen(tok)-1] != '"') { data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:710:17: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(str, " "); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:714:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:714:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:723:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->parmpath, tok, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:760:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(strnew, ""); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:761:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (tok[strlen(tok)-1] != '"') { data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:763:13: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(str, " "); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:767:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:767:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:772:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->dielXpath[thee->ndiel], tok, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:776:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->dielYpath[thee->ndiel], tok, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:780:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->dielZpath[thee->ndiel], tok, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:814:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(strnew, ""); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:815:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (tok[strlen(tok)-1] != '"') { data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:817:13: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(str, " "); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:821:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:821:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:827:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->kappapath[thee->nkappa], tok, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:859:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(strnew, ""); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:860:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (tok[strlen(tok)-1] != '"') { data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:862:13: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(str, " "); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:866:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:866:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:872:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->potpath[thee->npot], tok, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:905:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(strnew, ""); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:906:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (tok[strlen(tok)-1] != '"') { data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:908:13: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(str, " "); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:912:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:912:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:918:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->chargepath[thee->ncharge], tok, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:940:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(strnew, ""); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:941:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (tok[strlen(tok)-1] != '"') { data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:943:17: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(str, " "); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:947:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:947:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:953:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->meshpath[thee->nmesh], tok, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:1222:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->elecname[thee->nelec], tok, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:1348:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->apolname[thee->napol], tok, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:3139:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(parm->dxname, pbeparm->writestem[pbeparm->numwrite -1], CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:3268:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(parm->dxname, pbeparm->writestem[pbeparm->numwrite - 1], CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:282:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->runtype, tok, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:297:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->runname, tok, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:344:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->units, tok, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:400:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->grid2Dname[thee->grid2Dct], tok, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:408:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->grid2Dax[thee->grid2Dct], tok, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:452:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->termcombine, tok, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:500:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->moveType[molind], tok, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:563:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->termnam[thee->termct], tok, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:573:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->confil[thee->confilct], tok, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:656:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->xyzfil[mol][thee->xyzct[mol]], tok, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1152:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(strnew, ""); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1153:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (tok[strlen(tok)-1] != '"') { data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1155:13: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(str, " "); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1159:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1159:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1163:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->writestem[thee->numwrite], tok, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1194:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(strnew, ""); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1195:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (tok[strlen(tok)-1] != '"') { data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1197:13: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(str, " "); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1201:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1201:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(strnew, str+1, strlen(str)-2); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1204:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->writematstem, tok, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c:174:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->surffil[thee->surfct], tok, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c:211:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->imatfil[thee->imatct], tok, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c:226:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(thee->expfil[thee->expct], tok, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:215:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(tok) < VMAX_ARGLEN) strcpy(atomName, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:233:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(tok) < VMAX_ARGLEN) strcpy(resName, tok); data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:262:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(tok) == 1) { data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:759:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(endtag,"/"); data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:348:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(endtag,"/"); data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:628:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(tok) > VMAX_ARGLEN) { data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:630:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (%d)!\n", tok, strlen(tok)); data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:699:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(tok) > VMAX_ARGLEN) { data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:701:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tok, strlen(tok)); data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:706:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(tok) > VMAX_ARGLEN) { data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:708:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tok, strlen(tok)); data/apbs-3.0.0+dfsg1/apbs/src/generic/vstring.c:165:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen( str ); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1158:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gzwrite(outfile, header, strlen(header)*sizeof(char)); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1168:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gzwrite(outfile, line, strlen(line)*sizeof(char)); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1172:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gzwrite(outfile, newline, strlen(newline)*sizeof(char)); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1180:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gzwrite(outfile, newline, strlen(newline)*sizeof(char)); data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1189:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gzwrite(outfile, footer, strlen(footer)*sizeof(char)); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1810:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(pbeparm->writematstem) > strlenmax) { data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1819:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((int)strlen(pbeparm->writematstem) > strlenmax) { data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1834:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((int)strlen(pbeparm->writematstem) > strlenmax) { data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4993:5: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf(tabiparm->fpath, ""); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4994:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tabiparm->fname, nosh->molpath[0],4); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5244:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.runType_, parm->runtype, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5245:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.runName_, parm->runname, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5253:27: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). if(parm->setunits == 1) strncpy(pbamIn.units_, parm->units, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5257:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.map3D_, parm->map3dname, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5261:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.grid2D_[i], parm->grid2Dname[i], CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5262:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.grid2Dax_[i], parm->grid2Dax[i], CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5265:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.dxname_, parm->dxname, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5269:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.termCombine_, parm->termcombine, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5291:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.xyzfil_[i][j], parm->xyzfil[i][j], CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5298:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.moveType_[i], parm->moveType[i], CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5305:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.termnam_[i], parm->termnam[i], CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5312:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.confil_[i], parm->confil[i], CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5417:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.runType_, parm->runtype, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5418:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.runName_, parm->runname, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5421:27: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). if(parm->setunits == 1) strncpy(pbamIn.units_, parm->units, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5429:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.map3D_, parm->map3dname, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5433:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.grid2D_[i], parm->grid2Dname[i], CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5434:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.grid2Dax_[i], parm->grid2Dax[i], CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5437:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.dxname_, parm->dxname, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5441:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.termCombine_, parm->termcombine, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5463:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.xyzfil_[i][j], parm->xyzfil[i][j], CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5470:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.moveType_[i], parm->moveType[i], CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5477:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.termnam_[i], parm->termnam[i], CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5484:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbamIn.confil_[i], parm->confil[i], CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5495:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbsamIn.surffil_[i], samparm->surffil[i], CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5499:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbsamIn.imatfil_[i], samparm->imatfil[i], CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5503:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbsamIn.expfil_[i], samparm->expfil[i], CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5557:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pbsamIn.surffil_[i], surf, CHR_MAXLEN); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/analysis.c:123:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(scalarPath, tstr, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/analysis.c:133:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(maskPath, tstr, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/dxmath.c:116:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(gridPath[0], tok, VMAX_BUFSIZE); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/dxmath.c:131:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(gridPath[numop+1], tok, VMAX_BUFSIZE); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:298:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(scalar1Path, tstr, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:305:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(scalar2Path, tstr, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:312:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(transformPath, tstr, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:322:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(mask1Path, tstr, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:329:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(mask2Path, tstr, VMAX_ARGLEN); data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:356:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char* te = tb + strlen(tb); data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:375:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char* te = tb + strlen(tb); data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:633:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) + 1 > (bsz - (r - buff))) return 0; data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:654:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t lname = (name ? strlen(name) : 0); data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:659:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(r,name,lname+1); data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:757:91: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). # define PyString_AsStringAndSize(obj, s, len) {*s = PyString_AsString(obj); *len = *s ? strlen(*s) : 0;} data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:2726:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (psize) *psize = vptr ? (strlen((char *)vptr) + 1) : 0; data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:2759:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return SWIG_FromCharPtrAndSize(cptr, (cptr ? strlen(cptr) : 0)); data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:8069:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t size = strlen(name)+1; data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:8072:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(gv->name,name,size); data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:8134:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(const_table[j].name)) == 0) { data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:8143:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t lptr = strlen(ty->name)+2*sizeof(void*)+2; data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:8149:15: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buff, methods[i].ml_doc, ldoc); data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:8151:15: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buff, "swig_ptr: ", 10); data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:184:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char* te = tb + strlen(tb); data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:203:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char* te = tb + strlen(tb); data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:454:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) + 1 > (bsz - (r - buff))) return 0; data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:475:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t lname = (name ? strlen(name) : 0); data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:480:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(r,name,lname+1); data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:1576:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (psize) *psize = vptr ? (strlen(vptr) + 1) : 0; data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:3062:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t size = strlen(name)+1; data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:3065:17: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(gv->name,name,size); data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:3134:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(const_table[j].name)) == 0) { data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:3143:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t lptr = strlen(ty->name)+2*sizeof(void*)+2; data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:3149:29: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buff, methods[i].ml_doc, ldoc); data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:3151:29: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buff, "swig_ptr: ", 10); ANALYSIS SUMMARY: Hits = 877 Lines analyzed = 163869 in approximately 5.05 seconds (32458 lines/second) Physical Source Lines of Code (SLOC) = 105202 Hits@level = [0] 682 [1] 207 [2] 469 [3] 23 [4] 178 [5] 0 Hits@level+ = [0+] 1559 [1+] 877 [2+] 670 [3+] 201 [4+] 178 [5+] 0 Hits/KSLOC@level+ = [0+] 14.8191 [1+] 8.33634 [2+] 6.3687 [3+] 1.91061 [4+] 1.69198 [5+] 0 Dot directories skipped = 4 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.