Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/modules/NAMD/GlobalMasterAPBS.C
Examining data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/modules/NAMD/GlobalMasterAPBS.h
Examining data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c
Examining data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.h
Examining data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/wrapper.cpp
Examining data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Cholesky/LDLT.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Cholesky/LLT.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Cholesky/LLT_MKL.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/CholmodSupport/CholmodSupport.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Array.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/ArrayBase.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/ArrayWrapper.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Assign.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Assign_MKL.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/BandMatrix.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Block.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/BooleanRedux.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/CommaInitializer.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/CoreIterators.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/CwiseBinaryOp.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/CwiseNullaryOp.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/CwiseUnaryOp.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/CwiseUnaryView.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/DenseBase.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/DenseCoeffsBase.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/DenseStorage.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Diagonal.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/DiagonalMatrix.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/DiagonalProduct.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Dot.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/EigenBase.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Flagged.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/ForceAlignedAccess.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Functors.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Fuzzy.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/GeneralProduct.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/GenericPacketMath.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/GlobalFunctions.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/IO.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Map.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MapBase.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Matrix.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MatrixBase.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/NestByValue.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/NoAlias.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/NumTraits.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/PermutationMatrix.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/PlainObjectBase.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/ProductBase.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Random.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Redux.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Ref.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Replicate.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/ReturnByValue.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Reverse.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Select.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/SelfAdjointView.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/SelfCwiseBinaryOp.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/SolveTriangular.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/StableNorm.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Stride.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Swap.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Transpose.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Transpositions.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/TriangularMatrix.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/VectorBlock.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/VectorwiseOp.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Visitor.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/arch/AltiVec/Complex.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/arch/AltiVec/PacketMath.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/arch/Default/Settings.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/arch/NEON/Complex.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/arch/NEON/PacketMath.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/arch/SSE/Complex.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/arch/SSE/MathFunctions.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/arch/SSE/PacketMath.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/CoeffBasedProduct.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/GeneralBlockPanelKernel.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/GeneralMatrixMatrix.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/GeneralMatrixMatrixTriangular.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/GeneralMatrixMatrixTriangular_MKL.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/GeneralMatrixMatrix_MKL.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/GeneralMatrixVector.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/GeneralMatrixVector_MKL.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/Parallelizer.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/SelfadjointMatrixMatrix.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/SelfadjointMatrixMatrix_MKL.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/SelfadjointMatrixVector.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/SelfadjointMatrixVector_MKL.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/SelfadjointProduct.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/SelfadjointRank2Update.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/TriangularMatrixMatrix.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/TriangularMatrixMatrix_MKL.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/TriangularMatrixVector.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/TriangularMatrixVector_MKL.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/TriangularSolverMatrix.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/TriangularSolverMatrix_MKL.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/products/TriangularSolverVector.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/BlasUtil.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/Constants.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/DisableStupidWarnings.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/ForwardDeclarations.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/MKL_support.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/Macros.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/Memory.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/Meta.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/NonMPL2.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/ReenableStupidWarnings.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/StaticAssert.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/XprHelper.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Block.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Cwise.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/CwiseOperators.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/AlignedBox.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/All.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/AngleAxis.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/Hyperplane.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/ParametrizedLine.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/Quaternion.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/Rotation2D.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/RotationBase.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/Scaling.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/Transform.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Geometry/Translation.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/LU.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Lazy.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/LeastSquares.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Macros.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/MathFunctions.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Memory.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Meta.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/Minor.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/QR.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/SVD.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/TriangularSolver.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/VectorBlock.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/ComplexEigenSolver.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/ComplexSchur.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/ComplexSchur_MKL.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/EigenSolver.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/GeneralizedEigenSolver.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/GeneralizedSelfAdjointEigenSolver.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/HessenbergDecomposition.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/MatrixBaseEigenvalues.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/RealQZ.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/RealSchur.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/RealSchur_MKL.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/SelfAdjointEigenSolver.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/SelfAdjointEigenSolver_MKL.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/Tridiagonalization.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/AlignedBox.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/AngleAxis.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/EulerAngles.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/Homogeneous.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/Hyperplane.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/OrthoMethods.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/ParametrizedLine.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/Quaternion.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/Rotation2D.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/RotationBase.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/Scaling.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/Transform.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/Translation.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/Umeyama.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/arch/Geometry_SSE.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Householder/BlockHouseholder.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Householder/Householder.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Householder/HouseholderSequence.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/IterativeLinearSolvers/BasicPreconditioners.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/IterativeLinearSolvers/BiCGSTAB.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/IterativeLinearSolvers/ConjugateGradient.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/IterativeLinearSolvers/IncompleteLUT.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/IterativeLinearSolvers/IterativeSolverBase.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Jacobi/Jacobi.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/LU/Determinant.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/LU/FullPivLU.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/LU/Inverse.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/LU/PartialPivLU.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/LU/PartialPivLU_MKL.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/LU/arch/Inverse_SSE.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/MetisSupport/MetisSupport.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/OrderingMethods/Amd.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/OrderingMethods/Eigen_Colamd.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/OrderingMethods/Ordering.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/PaStiXSupport/PaStiXSupport.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/PardisoSupport/PardisoSupport.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/QR/ColPivHouseholderQR.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/QR/ColPivHouseholderQR_MKL.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/QR/FullPivHouseholderQR.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/QR/HouseholderQR.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/QR/HouseholderQR_MKL.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SPQRSupport/SuiteSparseQRSupport.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SVD/JacobiSVD.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SVD/JacobiSVD_MKL.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SVD/UpperBidiagonalization.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCholesky/SimplicialCholesky.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCholesky/SimplicialCholesky_impl.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/AmbiVector.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/CompressedStorage.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/ConservativeSparseSparseProduct.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/MappedSparseMatrix.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseBlock.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseColEtree.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseCwiseBinaryOp.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseCwiseUnaryOp.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseDenseProduct.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseDiagonalProduct.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseDot.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseFuzzy.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseMatrix.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseMatrixBase.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparsePermutation.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseProduct.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseRedux.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseSelfAdjointView.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseSparseProductWithPruning.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseTranspose.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseTriangularView.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseUtil.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseVector.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseView.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/TriangularSolver.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLUImpl.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_Memory.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_Structs.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_SupernodalMatrix.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_Utils.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_column_bmod.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_column_dfs.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_copy_to_ucol.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_gemm_kernel.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_heap_relax_snode.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_kernel_bmod.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_panel_bmod.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_panel_dfs.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_pivotL.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_pruneL.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseLU/SparseLU_relax_snode.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseQR/SparseQR.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/StlSupport/StdDeque.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/StlSupport/StdList.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/StlSupport/StdVector.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/StlSupport/details.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SuperLUSupport/SuperLUSupport.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/UmfPackSupport/UmfPackSupport.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/misc/Image.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/misc/Kernel.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/misc/Solve.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/misc/SparseSolve.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/misc/blas.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/plugins/ArrayCwiseBinaryOps.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/plugins/ArrayCwiseUnaryOps.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/plugins/BlockMethods.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/plugins/CommonCwiseBinaryOps.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/plugins/CommonCwiseUnaryOps.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/plugins/MatrixCwiseBinaryOps.h
Examining data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/plugins/MatrixCwiseUnaryOps.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/apbs.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/fem/vcsm.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/fem/vcsm.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/fem/vpee.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/fem/vpee.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/bemparm.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/bemparm.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/geoflowparm.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/geoflowparm.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vacc.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vacc.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vcap.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vcap.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vclist.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vclist.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vgreen.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vgreen.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vmatrix.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vpbe.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vpbe.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vstring.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vstring.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/vunit.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/main.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vmgrid.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vmgrid.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vopot.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vopot.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmg.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmg.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmgp.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmgp.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/buildAd.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/buildAd.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/buildBd.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/buildBd.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/buildGd.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/buildGd.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/buildPd.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/buildPd.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/cgd.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/cgd.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/gsd.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/gsd.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/matvecd.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/matvecd.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mgcsd.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mgcsd.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mgdrvd.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mgdrvd.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mgfasd.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mgfasd.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mgsubd.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mgsubd.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mikpckd.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mikpckd.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mlinpckd.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mlinpckd.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mypdec.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/mypdec.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/newdrvd.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/newdrvd.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/newtond.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/newtond.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/powerd.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/powerd.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/smoothd.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/pmgc/smoothd.h
Examining data/apbs-3.0.0+dfsg1/apbs/src/routines.c
Examining data/apbs-3.0.0+dfsg1/apbs/src/routines.h
Examining data/apbs-3.0.0+dfsg1/apbs/tools/manip/born.c
Examining data/apbs-3.0.0+dfsg1/apbs/tools/manip/coulomb.c
Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/analysis.c
Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/benchmark.c
Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/del2dx.c
Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/dx2mol.c
Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/dx2uhbd.c
Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/dxmath.c
Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx.c
Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c
Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mgmesh.c
Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/multivalue.c
Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c
Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/smooth.c
Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/tensor2dx.c
Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/uhbd_asc2bin.c
Examining data/apbs-3.0.0+dfsg1/apbs/tools/mesh/value.c
Examining data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c
Examining data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c
Examining data/apbs-3.0.0+dfsg1/apbs/tools/windows/configuration headers/apbscfg.h
Examining data/apbs-3.0.0+dfsg1/apbs/tools/windows/configuration headers/maloccf.h

FINAL RESULTS:

data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:826:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(string, mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:829:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(string,mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:832:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(string,mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:835:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(string,mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:839:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(string,mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:844:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(string,mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:850:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(string,mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:854:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(string,mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:859:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(string,mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:866:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(string,mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:873:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(string,mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:875:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(string,mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:881:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(string,mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:886:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(string, mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:894:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(string, mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:904:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(string, mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:912:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(string, mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:920:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(string, mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:927:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(string, mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:934:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(string, mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:938:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(string, "%swrite pot dx iapbs-pot-%d\n", string, getpid());
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:981:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(string, mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:984:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(string, mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:991:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(string, mybuf);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:999:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(string, mybuf);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:118:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy(file_name_x,argv[1]);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:128:1:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
strcat(file_name_y,mid);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:135:1:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
strcat(file_name_z,mid);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:142:1:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
strcat(file_name_k,mid); 
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:149:1:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
strcat(file_name_c, mid);   /* add in the extension */ 
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:590:1:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
strcat(f1,ext);            /* add back m.dx  */
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:632:1:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
strcat(f2,ext);               /* add back m.dx  */
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:674:1:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
strcat(f3,ext);            /* add back m.dx  */
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:716:1:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
strcat(f4,ext);               /* add back m.dx  */
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:757:1:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
strcat(f5,ext);               /* add back m.dx  */
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:794:1:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
strcat(f6, &file_name_c[6]);  /* add the appropriate _ext.dx */
data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1084:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( mmtitle, "Sparse '%s' Matrix - Harwell-Boeing Format - '%s'",
data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1113:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf( fp, ptrfmtstr, Ablock->IA[i] + (i+1) );
data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1127:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf( fp, indfmtstr, i+1); /* diagonal */
data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1133:17:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                fprintf( fp, indfmtstr, JA[jj] + 1 ); /* lower triangle */
data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1149:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf( fp, valfmtstr, D[i] );
data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1155:17:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                fprintf( fp, valfmtstr, L[jj] );
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:610:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:614:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:616:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tok, strnew);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:629:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:633:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:635:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tok, strnew);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:648:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:652:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:654:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tok, strnew);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:687:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:691:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:693:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tok, strnew);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:709:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:713:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:715:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tok, strnew);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:762:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:766:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:768:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(tok, strnew);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:816:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:820:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:822:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(tok, strnew);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:861:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:865:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:867:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(tok, strnew);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:907:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:911:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:913:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(tok, strnew);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:942:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:946:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:948:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tok, strnew);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:1141:24:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
            } else if (sscanf(tok, "%s", name) == 1) {
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:3149:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(parm->map3dname, pbeparm->pbam_3dmapstem);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1122:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(thee->pbam_3dmapstem, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1154:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1158:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1160:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(tok, strnew);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1196:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1200:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(str, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1202:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(tok, strnew);
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:215:36:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (strlen(tok) < VMAX_ARGLEN) strcpy(atomName, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:233:36:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (strlen(tok) < VMAX_ARGLEN) strcpy(resName, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:772:51:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        if (Vstring_strcasecmp(endtag, "/") == 0) strcat(endtag, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c:195:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(thee->resName, resName);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c:203:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(resName,thee->resName);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c:210:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(thee->atomName, atomName);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c:217:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(atomName,thee->atomName);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:578:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf sprintf_s
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:619:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf( buff, 1000, msg, arg );                  \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:628:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf( buff, 1000, msg, arg0, arg1 );           \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:637:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(buff, 1000, msg, arg0, arg1, arg2);       \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:661:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf( buff, 1000, msg, arg0 );                  \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:668:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf( buff, 1000, msg, arg0, arg1 );            \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:675:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(buff, 1000, msg, arg0, arg1, arg2);         \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:711:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf( buff, 1000, msg, arg );                        \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:723:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf( buff, 1000, msg, arg0, arg1 );                 \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:745:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf( buff, 1000, msg, arg );                        \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:757:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf( buff, 1000, msg, arg0, arg1 );                 \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:793:25:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                        snprintf(buff, 1000, msg, arg0);                  \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:811:25:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                        snprintf(buff, 1000, msg, arg0, arg1);            \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:842:25:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                        snprintf(buff, 1000, msg, arg0);                  \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:857:25:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                        snprintf(buff, 1000, msg, arg0, arg1);            \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:882:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf( buff, 1000, msg, arg );                  \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:892:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf( buff, 1000, msg, arg0, arg1);            \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:910:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf( buff, 1000, msg, arg );  \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:920:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf( buff, 1000, msg, arg0, arg1); \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:362:51:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        if (Vstring_strcasecmp(endtag, "/") == 0) strcat(endtag, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:385:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(currResName, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:411:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(res->name, currResName);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:413:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
              strcpy(atoms[i].resName, currResName);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:510:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(currResName, atoms[0].resName);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:513:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(currResName, atoms[i].resName);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:531:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(res->name, atoms[0].resName);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:537:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(res->name, atoms[i].resName);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:577:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dest->atomName, thee->atomName);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:578:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dest->resName, thee->resName);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:593:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dest->name, thee->name);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:634:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
              strcpy(atom->atomName, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:704:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(atom->resName, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:711:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(atom->atomName, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vstring.c:134:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(name,tok);
data/apbs-3.0.0+dfsg1/apbs/src/main.c:359:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(output_path, "%s_%d", output_path, rank);
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1144:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(header,
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1346:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(precFormat, Vprecision, xminPART, yminPART, zminPART);
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1348:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(precFormat, Vprecision, hx, 0.0, 0.0);
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1350:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(precFormat, Vprecision, 0.0, hy, 0.0);
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1352:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(precFormat, Vprecision, 0.0, 0.0, hzed);
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1407:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(precFormat, Vprecision, xmin, ymin, zmin);
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1409:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(precFormat, Vprecision, hx, 0.0, 0.0);
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1411:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(precFormat, Vprecision, 0.0, hy, 0.0);
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1413:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(precFormat, Vprecision, 0.0, 0.0, hzed);
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1585:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(precFormat, Vprecision, xminPART, yminPART, zminPART);
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1588:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(precFormat, Vprecision, hx, 0.0, 0.0);
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1591:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(precFormat, Vprecision, 0.0, hy, 0.0);
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1594:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(precFormat, Vprecision, 0.0, 0.0, hzed);
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1642:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(precFormat, Vprecision, xmin, ymin, zmin);
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1645:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(precFormat, Vprecision, hx, 0.0, 0.0);
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1648:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(precFormat, Vprecision, 0.0, hy, 0.0);
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1651:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(precFormat, Vprecision, 0.0, 0.0, hzed);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1816:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(writematstem, "%s-PE%d", pbeparm->writematstem, rank);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1826:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(writematstem, "%s-PE%d", pbeparm->writematstem,nosh->proc_rank);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1828:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(writematstem, "%s", pbeparm->writematstem);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1840:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(outpath, "%s.%s", writematstem, "mat");
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2654:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(writestem, "%s-PE%d", pbeparm->writestem[i], rank);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2657:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(writestem, "%s-PE%d", pbeparm->writestem[i],nosh->proc_rank);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2659:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(writestem, "%s", pbeparm->writestem[i]);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2666:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(outpath, "%s.%s", writestem, "dx");
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2676:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(outpath, "%s.%s", writestem, "dxbin");
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2687:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(outpath, "%s.%s", writestem, "ucd");
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2694:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(outpath, "%s.%s", writestem, "mcsf");
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2701:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(outpath, "%s.%s", writestem, "grd");
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2711:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(outpath, "%s.%s", writestem, "dx.gz");
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2720:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(outpath, "%s.%s", writestem, "txt");
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4425:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(writestem, "%s-PE%d", pbeparm->writestem[i], rank);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4428:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(writestem, "%s-PE%d", pbeparm->writestem[i],nosh->proc_rank);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4430:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(writestem, "%s", pbeparm->writestem[i]);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4437:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(outpath, "%s.%s", writestem, "dx");
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4444:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(outpath, "%s.%s", writestem, "dxbin");
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4450:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(outpath, "%s.%s", writestem, "ucd");
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5545:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
       sprintf(fname_tp, "msms.exe -if %s -prob %f -dens %f -of %s",
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5548:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
       sprintf(fname_tp, "msms -if %s -prob %f -dens %f -of %s",
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5555:14:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      ierr = system(fname_tp);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx.c:485:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(outname,"%s",argv[i]);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:590:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(outname,argv[i++]);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:620:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(fnams[*numfnams],argv[i++]);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/smooth.c:96:17:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
            if (sscanf(argv[i], "--input=%s", inPath) == 1) gotInPath = 1;
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/smooth.c:102:17:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
            if (sscanf(argv[i], "--output=%s", outPath) == 1) gotOutPath = 1;
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/uhbd_asc2bin.c:30:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    scanf("%s", flnm);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/uhbd_asc2bin.c:42:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    scanf("%s", newfile);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/uhbd_asc2bin.c:54:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(inFile, "%s", title);
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:634:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r,name);
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:704:25:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define PyOS_snprintf _snprintf
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:706:25:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define PyOS_snprintf snprintf
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:723:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  res = vsnprintf(buf, sizeof(buf), fmt, ap);
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:455:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r,name);
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:617:23:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define PyOS_snprintf snprintf
data/apbs-3.0.0+dfsg1/apbs/tools/windows/configuration headers/maloccf.h:306:27:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#    define VDEBUGIO(str) fprintf(stderr,str)
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:433:56:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
template<typename Scalar> inline EIGEN_MATHFUNC_RETVAL(random, Scalar) random(const Scalar& x, const Scalar& y);
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:433:72:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
template<typename Scalar> inline EIGEN_MATHFUNC_RETVAL(random, Scalar) random(const Scalar& x, const Scalar& y);
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:434:56:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
template<typename Scalar> inline EIGEN_MATHFUNC_RETVAL(random, Scalar) random();
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:434:72:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
template<typename Scalar> inline EIGEN_MATHFUNC_RETVAL(random, Scalar) random();
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:526:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    return Scalar(random(real(x), real(y)),
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:527:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                  random(imag(x), imag(y)));
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:532:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    return Scalar(random<RealScalar>(), random<RealScalar>());
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:532:41:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    return Scalar(random<RealScalar>(), random<RealScalar>());
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:537:30:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
inline EIGEN_MATHFUNC_RETVAL(random, Scalar) random(const Scalar& x, const Scalar& y)
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:537:46:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
inline EIGEN_MATHFUNC_RETVAL(random, Scalar) random(const Scalar& x, const Scalar& y)
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:539:30:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  return EIGEN_MATHFUNC_IMPL(random, Scalar)::run(x, y);
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:543:30:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
inline EIGEN_MATHFUNC_RETVAL(random, Scalar) random()
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:543:46:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
inline EIGEN_MATHFUNC_RETVAL(random, Scalar) random()
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:545:30:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  return EIGEN_MATHFUNC_IMPL(random, Scalar)::run();
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/MathFunctions.h:737:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    return random<int>(0,1)==0 ? false : true;
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/Random.h:20:68:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  inline const Scalar operator() (Index, Index = 0) const { return random<Scalar>(); }
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/MathFunctions.h:27:63:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
template<typename T> inline T ei_random () { return internal::random<T>(); }
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigen2Support/MathFunctions.h:28:85:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
template<typename T> inline T ei_random (const T& x, const T& y) { return internal::random(x, y); }
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/RealQZ.h:440:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        x = internal::random<Scalar>(-1.0,1.0);
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/RealQZ.h:441:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        y = internal::random<Scalar>(-1.0,1.0);
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Eigenvalues/RealQZ.h:442:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        z = internal::random<Scalar>(-1.0,1.0);
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/AlignedBox.h:168:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
             * internal::random<Scalar>(Scalar(0), Scalar(1));
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Geometry/AlignedBox.h:171:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        r[d] = internal::random(m_min[d], m_max[d]);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/modules/NAMD/GlobalMasterAPBS.C:223:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[129];
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/modules/NAMD/GlobalMasterAPBS.C:231:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[129];
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/modules/NAMD/GlobalMasterAPBS.C:589:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(r_param, params->r_param, 9*sizeof(double));
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/modules/NAMD/GlobalMasterAPBS.C:772:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *fd = fopen(path, "rt");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/modules/NAMD/GlobalMasterAPBS.C:777:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:791:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *setupString(double r_param[9], int i_param[25], double grid[3], 
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:798:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char string[MAX_BUF_SIZE];
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:799:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char mybuf[MAX_BUF_SIZE];
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:802:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(string, "read\n mol pqr ion.pqr\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:805:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "charge dx iapbs-charge.dx\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:808:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "kappa dx iapbs-kappa.dx\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:811:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "diel dx iapbs-dielx.dx iapbs-diely.dx iapbs-dielz.dx\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:814:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "pot dx iapbs-pot.dx\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:816:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(string, "end\n\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:819:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(string, "elec name elec\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:821:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 0: sprintf(mybuf, "mg-manual\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:822:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 1: sprintf(mybuf, "mg-auto\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:823:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 2: sprintf(mybuf, "mg-para\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:828:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(mybuf, "dime %i %i %i\n", dime[0], dime[1], dime[2]);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:831:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(mybuf, "grid %.3f %.3f %.3f\n", grid[0], grid[1], grid[2]);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:834:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(mybuf, "# nlev %i\n", i_param[1]);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:838:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(mybuf, "glen %.3f %.3f %.3f\n", glen[0], glen[1], glen[2]);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:843:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(mybuf, "gcent %.3f %.3f %.3f\n", center[0], center[1], center[2]);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:846:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "gcent mol 1\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:849:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(mybuf, "cglen %.3f %.3f %.3f\n", cglen[0], cglen[1], cglen[2]);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:853:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(mybuf, "fglen %.3f %.3f %.3f\n", fglen[0], fglen[1], fglen[2]);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:857:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(mybuf, "cgcent %.3f %.3f %.3f\n", 
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:861:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "cgcent mol 1\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:864:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(mybuf, "fgcent %.3f %.3f %.3f\n", 
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:868:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "fgcent mol 1\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:872:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(mybuf, "pdime %i %i %i\n", pdime[0], pdime[1], pdime[2]);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:874:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(mybuf, "ofrac %.3f\n", *ofrac);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:879:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(mybuf, "ion charge %.3f conc %.3f radius %.3f\n", 
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:883:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(mybuf, "pdie %.3f \nsdie %.3f\nsrad %.3f\nswin %.3f\n\
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:889:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 0: sprintf(mybuf, "chgm spl0\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:890:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 1: sprintf(mybuf, "chgm spl2\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:891:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 2: sprintf(mybuf, "chgm spl4\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:896:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 0: sprintf(mybuf, "lpbe\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:897:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 1: sprintf(mybuf, "npbe\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:898:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 2: sprintf(mybuf, "lrpbe\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:899:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 3: sprintf(mybuf, "nrpbe\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:900:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        case 4: sprintf(mybuf, "smpbe vol %.3f size %.3f\n", 
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:906:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 0: sprintf(mybuf, "bcfl zero\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:907:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 1: sprintf(mybuf, "bcfl sdh\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:908:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 2: sprintf(mybuf, "bcfl mdh\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:909:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 4: sprintf(mybuf, "bcfl focus\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:914:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 0: sprintf(mybuf, "srfm mol\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:915:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 1: sprintf(mybuf, "srfm smol\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:916:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 2: sprintf(mybuf, "srfm spl2\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:917:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 3: sprintf(mybuf, "srfm spl4\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:922:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 0: sprintf(mybuf, "calcenergy no\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:923:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 1: sprintf(mybuf, "calcenergy total\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:924:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 2: sprintf(mybuf, "calcenergy comps\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:929:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        case 0: sprintf(mybuf, "calcforce no\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:930:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 1: sprintf(mybuf, "calcforce total\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:931:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case 2: sprintf(mybuf, "calcforce comps\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:941:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "write charge dx iapbs-charge\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:944:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "write smol dx iapbs-smol\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:947:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "write kappa dx iapbs-kappa\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:950:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "write dielx dx iapbs-dielx\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:951:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "write diely dx iapbs-diely\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:952:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "write dielz dx iapbs-dielz\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:955:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "write atompot dx iapbs-atompot\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:960:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "usemap charge 1\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:963:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "usemap kappa 1\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:966:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "usemap diel 1\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:969:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "usemap pot 1\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:971:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(string, "end\n\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:976:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "apolar name npolar\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:977:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "bconc 0.0\npress 0.0\ndpos 0.2\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:978:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "mol 1\nsrfm sacc\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:979:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "grid 0.2 0.2 0.2\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:980:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(mybuf, "gamma %.3f\n", r_param[6]);
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:982:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(mybuf, "srad %.3f\nswin %.3f\ntemp %.3f\nsdens %.3f\n", \
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:987:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      case 1: sprintf(mybuf, "calcenergy total\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:988:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      case 2: sprintf(mybuf, "calcenergy comps\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:994:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      case 0: sprintf(mybuf, "calcforce no\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:995:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      case 1: sprintf(mybuf, "calcforce total\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:996:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      case 2: sprintf(mybuf, "calcforce comps\n"); break;
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:1001:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "end\n\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:1006:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(string, "print elecEnergy elec end\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:1008:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(string, "print apolEnergy npolar end\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:1013:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(string, "print elecForce elec end\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:1016:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(string, "print apolForce npolar end\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.c:1020:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(string, "\nquit\n");
data/apbs-3.0.0+dfsg1/apbs/contrib/iapbs/src/apbs_driver.h:254:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *setupString(double r_param[9], int i_param[25], double grid[3], 
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:108:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char s[100], file_name_x[20], file_name_y[20], file_name_z[20];
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:109:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char file_name_k[20], file_name_c[20];
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:110:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char f1[21], f2[21], f3[21], f4[21], f5[21], f6[21];
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:111:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ext[5]="m.dx", mid[21];
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:130:1:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
strcat(file_name_y,".dx");
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:137:1:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
strcat(file_name_z,".dx");
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:144:1:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
strcat(file_name_k,".dx");
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:151:1:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
strcat(file_name_c,".dx");  /* add back .dx         */
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:173:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
in = fopen(file_name_x,"r");
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:282:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
in = fopen(file_name_y,"r");
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:342:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
in = fopen(file_name_z,"r");
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:407:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
in = fopen(file_name_k,"r");
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:472:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
in = fopen(file_name_c,"r");
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:591:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
out = fopen(f1,"w");
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:633:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
out = fopen(f2,"w");
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:675:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
out = fopen(f3,"w");
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:717:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
out = fopen(f4,"w");
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:758:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
out = fopen(f5,"w");
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:793:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy (f6,"change_map");
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:795:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
out = fopen(f6,"w");
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/Memory.h:174:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    std::memcpy(newptr, ptr, (std::min)(size,old_size));
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/Core/util/Memory.h:509:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  { memcpy(target, start, std::ptrdiff_t(end)-std::ptrdiff_t(start)); }
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/AmbiVector.h:93:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(newBuffer,  m_buffer,  copyElements * sizeof(ListEl));
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/CompressedStorage.h:54:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(m_values, other.m_values, m_size * sizeof(Scalar));
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/CompressedStorage.h:55:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(m_indices, other.m_indices, m_size * sizeof(Index));
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseBlock.h:148:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        std::memcpy(&newdata.value(0), &m_matrix.data().value(0), start*sizeof(Scalar));
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseBlock.h:149:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        std::memcpy(&newdata.index(0), &m_matrix.data().index(0), start*sizeof(Index));
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseBlock.h:151:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        std::memcpy(&newdata.value(start), &tmp.data().value(0), nnz*sizeof(Scalar));
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseBlock.h:152:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        std::memcpy(&newdata.index(start), &tmp.data().index(0), nnz*sizeof(Index));
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseBlock.h:154:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        std::memcpy(&newdata.value(start+nnz), &matrix.data().value(end), tail_size*sizeof(Scalar));
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseBlock.h:155:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        std::memcpy(&newdata.index(start+nnz), &matrix.data().index(end), tail_size*sizeof(Index));
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseBlock.h:169:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        std::memcpy(&matrix.data().value(start), &tmp.data().value(0), nnz*sizeof(Scalar));
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseBlock.h:170:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        std::memcpy(&matrix.data().index(start), &tmp.data().index(0), nnz*sizeof(Index));
data/apbs-3.0.0+dfsg1/apbs/include/Eigen/src/SparseCore/SparseMatrix.h:714:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(m_outerIndex, other.m_outerIndex, (m_outerSize+1)*sizeof(Index));
data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1037:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mmtitle[72];
data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1073:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(ptrfmt,"(%dI%d)",nptrline,numZdigits+1);
data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1074:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(ptrfmtstr,"%%%dd",numZdigits+1);
data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1075:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(indfmt,"(%dI%d)",nindline,nrowdigits+1);
data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1076:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(indfmtstr,"%%%dd",nrowdigits+1);
data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:1089:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen( fname, "w" );
data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:239:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:270:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:288:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:310:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:329:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:348:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:367:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:386:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:439:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:492:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:511:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:530:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:559:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.c:577:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VPUBLIC Vrc_Codes APOLparm_parseToken(APOLparm *thee, char tok[VMAX_BUFSIZE],
data/apbs-3.0.0+dfsg1/apbs/src/generic/apolparm.h:250:56:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VEXTERNC Vrc_Codes APOLparm_parseToken(APOLparm *thee, char tok[VMAX_BUFSIZE],
data/apbs-3.0.0+dfsg1/apbs/src/generic/bemparm.c:212:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/bemparm.c:235:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/bemparm.c:258:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/bemparm.c:281:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/bemparm.c:310:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/bemparm.c:332:53:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VPUBLIC Vrc_Codes BEMparm_parseToken(BEMparm *thee, char tok[VMAX_BUFSIZE],
data/apbs-3.0.0+dfsg1/apbs/src/generic/bemparm.h:177:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VEXTERNC Vrc_Codes      BEMparm_parseToken(BEMparm *thee, char tok[VMAX_BUFSIZE],
data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:202:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:226:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:248:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:278:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:305:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:335:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:354:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:374:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:393:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:412:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.c:431:53:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VPUBLIC Vrc_Codes FEMparm_parseToken(FEMparm *thee, char tok[VMAX_BUFSIZE],
data/apbs-3.0.0+dfsg1/apbs/src/generic/femparm.h:246:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VEXTERNC Vrc_Codes FEMparm_parseToken(FEMparm *thee, char tok[VMAX_BUFSIZE],
data/apbs-3.0.0+dfsg1/apbs/src/generic/geoflowparm.c:144:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/geoflowparm.c:166:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/geoflowparm.c:188:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/geoflowparm.c:212:61:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VPUBLIC Vrc_Codes GEOFLOWparm_parseToken(GEOFLOWparm *thee, char tok[VMAX_BUFSIZE],
data/apbs-3.0.0+dfsg1/apbs/src/generic/geoflowparm.h:158:67:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VEXTERNC Vrc_Codes      GEOFLOWparm_parseToken(GEOFLOWparm *thee, char tok[VMAX_BUFSIZE],
data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:417:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:448:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:499:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:518:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:541:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:572:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:603:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:618:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:670:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:701:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:732:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:784:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:836:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:874:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:894:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.c:919:51:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VPUBLIC Vrc_Codes MGparm_parseToken(MGparm *thee, char tok[VMAX_BUFSIZE],
data/apbs-3.0.0+dfsg1/apbs/src/generic/mgparm.h:357:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VEXTERNC Vrc_Codes      MGparm_parseToken(MGparm *thee, char tok[VMAX_BUFSIZE],
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:520:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:600:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE], str[VMAX_BUFSIZE]="", strnew[VMAX_BUFSIZE]="";
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:677:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE], str[VMAX_BUFSIZE]="", strnew[VMAX_BUFSIZE]="";
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:741:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE], str[VMAX_BUFSIZE]="", strnew[VMAX_BUFSIZE]="";
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:795:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE], str[VMAX_BUFSIZE]="", strnew[VMAX_BUFSIZE]="";
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:841:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE], str[VMAX_BUFSIZE]="", strnew[VMAX_BUFSIZE]="";
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:886:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE], str[VMAX_BUFSIZE]="", strnew[VMAX_BUFSIZE]="";
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:932:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE], str[VMAX_BUFSIZE]="", strnew[VMAX_BUFSIZE]="";
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:972:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:1023:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:1024:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:1191:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:1317:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:1516:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:2391:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:2514:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:2851:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:2940:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:3054:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:3172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:232:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char molpath[NOSH_MAXMOL][VMAX_ARGLEN];   /**< Paths to mol files */
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:237:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char parmpath[VMAX_ARGLEN];   /**< Paths to parm file */
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:240:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dielXpath[NOSH_MAXMOL][VMAX_ARGLEN];  /**< Paths to x-shifted
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:242:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dielYpath[NOSH_MAXMOL][VMAX_ARGLEN];  /**< Paths to y-shifted
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:244:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dielZpath[NOSH_MAXMOL][VMAX_ARGLEN];  /**< Paths to z-shifted
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:248:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char kappapath[NOSH_MAXMOL][VMAX_ARGLEN]; /**< Paths to kappa map files */
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:251:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char potpath[NOSH_MAXMOL][VMAX_ARGLEN]; /**< Paths to potential map files */
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:254:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char chargepath[NOSH_MAXMOL][VMAX_ARGLEN];   /**< Paths to charge map files */
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:257:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char meshpath[NOSH_MAXMOL][VMAX_ARGLEN];   /**< Paths to mesh files */
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:267:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char elecname[NOSH_MAXCALC][VMAX_ARGLEN]; /**< Optional user-specified name
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.h:269:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char apolname[NOSH_MAXCALC][VMAX_ARGLEN]; /**< Optional user-specified name
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:254:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:273:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:291:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:312:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:338:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:353:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:373:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:393:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:446:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:460:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:479:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:551:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:634:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:662:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VPUBLIC Vrc_Codes PBAMparm_parseToken(PBAMparm *thee, char tok[VMAX_BUFSIZE],
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:115:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char runtype[CHR_MAXLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char runname[CHR_MAXLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:130:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char units[CHR_MAXLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:141:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char map3dname[CHR_MAXLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:145:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char grid2Dname[PBAMPARM_MAXWRITE][CHR_MAXLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:146:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char grid2Dax[PBAMPARM_MAXWRITE][CHR_MAXLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:152:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dxname[CHR_MAXLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:161:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char termcombine[CHR_MAXLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:165:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char moveType[PBAMPARM_MAXMOL][CHR_MAXLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char termnam[PBAMPARM_MAXWRITE][CHR_MAXLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:175:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char confil[PBAMPARM_MAXWRITE][CHR_MAXLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:181:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char xyzfil[PBAMPARM_MAXMOL][PBAMPARM_MAXWRITE][CHR_MAXLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.h:233:56:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VEXTERNC Vrc_Codes PBAMparm_parseToken(PBAMparm *thee, char tok[VMAX_BUFSIZE],
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:384:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:419:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char type[VMAX_BUFSIZE]; /* vol or size (keywords) */
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:420:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[VMAX_BUFSIZE]; /* floating point value */
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:475:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:560:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:561:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:653:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:672:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:691:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:710:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:781:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:800:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:819:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:838:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:896:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:949:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1006:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1026:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1045:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1064:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1085:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE], str[VMAX_BUFSIZE]="", strnew[VMAX_BUFSIZE]="";
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1179:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE], str[VMAX_BUFSIZE]="", strnew[VMAX_BUFSIZE]="";
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1215:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VPUBLIC int PBEparm_parseToken(PBEparm *thee, char tok[VMAX_BUFSIZE],
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.h:186:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char writestem[PBEPARM_MAXWRITE][VMAX_ARGLEN]; /**< File stem to write
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.h:195:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char writematstem[VMAX_ARGLEN];  /**< File stem to write mat */
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.h:202:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pbam_3dmapstem[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.h:308:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tok[VMAX_BUFSIZE], /**< Token to parse */
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c:168:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c:184:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c:205:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c:220:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c:234:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c:252:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VPUBLIC Vrc_Codes PBSAMparm_parseToken(PBSAMparm *thee, char tok[VMAX_BUFSIZE],
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.h:121:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char surffil[PBSAMPARM_MAXMOL][CHR_MAXLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.h:125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char imatfil[PBSAMPARM_MAXMOL][CHR_MAXLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.h:129:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expfil[PBSAMPARM_MAXMOL][CHR_MAXLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.h:181:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VEXTERNC Vrc_Codes PBSAMparm_parseToken(PBSAMparm *thee, char tok[VMAX_BUFSIZE],
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:188:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:207:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char atomName[VMAX_ARGLEN]) {
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:209:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:225:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char resName[VMAX_ARGLEN]) {
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:227:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:245:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:300:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:319:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:348:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char atomName[VMAX_ARGLEN], /* Set to atom name */
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:349:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char resName[VMAX_ARGLEN], /* Set to residue name */
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:524:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:525:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char atomName[VMAX_ARGLEN], resName[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:616:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:617:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char atomName[VMAX_ARGLEN], resName[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:618:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char chs[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:730:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:731:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char endtag[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c:182:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, thee, sizeof(Vatom));
data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c:192:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VPUBLIC void Vatom_setResName(Vatom *thee, char resName[VMAX_RECLEN]) {
data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c:199:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VPUBLIC void Vatom_getResName(Vatom *thee, char resName[VMAX_RECLEN]) {
data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c:207:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VPUBLIC void Vatom_setAtomName(Vatom *thee, char atomName[VMAX_RECLEN]) {
data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.c:214:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VPUBLIC void Vatom_getAtomName(Vatom *thee, char atomName[VMAX_RECLEN]) {
data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.h:97:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char resName[VMAX_RECLEN]; /**< Residue name from PDB/PQR file */
data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.h:98:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char atomName[VMAX_RECLEN]; /**< Atom name from PDB/PDR file */
data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.h:242:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VEXTERNC void    Vatom_setResName(Vatom *thee, char resName[VMAX_RECLEN]);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.h:250:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char atomName[VMAX_RECLEN]  /**< Atom name */
data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.h:259:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VEXTERNC void    Vatom_getResName(Vatom *thee, char resName[VMAX_RECLEN]);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vatom.h:267:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char atomName[VMAX_RECLEN] /**< Atom name */
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:618:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buff[1000];                                   \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:627:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buff[1000];                                   \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:636:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buff[1000];                                   \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:660:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buff[1000];                                    \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:667:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buff[1000];                                    \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:674:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buff[1000];                                     \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:710:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buff[1000];                                         \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:722:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buff[1000];                                         \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:744:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buff[1000];                                         \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:756:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buff[1000];                                         \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:792:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char buff[1000];                                  \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:810:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char buff[1000];                                  \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:841:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char buff[1000];                                  \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:856:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char buff[1000];                                  \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:881:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buff[1000];                                   \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:891:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buff[1000];                                   \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:909:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buff[1000];                   \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vhal.h:919:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buff[1000];                        \
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:242:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resName[VMAX_ARGLEN]) {
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:268:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resName[VMAX_ARGLEN], char atomName[VMAX_ARGLEN]) {
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:268:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resName[VMAX_ARGLEN], char atomName[VMAX_ARGLEN]) {
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:317:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char currResName[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:318:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:319:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char endtag[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:454:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char currResName[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:613:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:694:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.h:93:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char atomName[VMAX_ARGLEN];  /**< Atom name */
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.h:94:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char resName[VMAX_ARGLEN];  /**< Residue name */
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.h:116:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[VMAX_ARGLEN]; /**< Residue name */
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.h:291:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resName[VMAX_ARGLEN]);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.h:305:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resName[VMAX_ARGLEN], char atomName[VMAX_ARGLEN]);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.h:305:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resName[VMAX_ARGLEN], char atomName[VMAX_ARGLEN]);
data/apbs-3.0.0+dfsg1/apbs/src/generic/vstring.c:132:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char checkchar[1];
data/apbs-3.0.0+dfsg1/apbs/src/generic/vstring.c:133:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/generic/vstring.c:223:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( wrap_str + k, str + i, line_len * sizeof( char ) );
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:80:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VPRIVATE char Vprecision[26];
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:142:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(Vprecision,"%%12.%de %%12.%de %%12.%de", VGRID_DIGITS,
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:471:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:595:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:815:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:828:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fd = fopen(fname,"rb");
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1025:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char header[8196];
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1026:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char footer[8196];
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1027:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[80];
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1030:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char precFormat[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1167:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf(line, "%12.6e ", thee->data[u]);
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1184:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(footer, "attribute \"dep\" string \"positions\"\n" \
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1215:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char precFormat[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1467:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char precFormat[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1493:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		FILE *fd = fopen(fname,"wb");
data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmg.c:87:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VPUBLIC void Vpmg_printColComp(Vpmg *thee, char path[72], char title[72],
data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmg.c:87:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VPUBLIC void Vpmg_printColComp(Vpmg *thee, char path[72], char title[72],
data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmg.c:88:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mxtype[3], int flag) {
data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmg.c:11040:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    outFile = fopen(path, "w");
data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmg.h:787:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[72],  /**< The file to which the matrix is to be written */
data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmg.h:788:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char title[72],  /**< The title of the matrix */
data/apbs-3.0.0+dfsg1/apbs/src/mg/vpmg.h:789:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char mxtype[3],   /**< The type of REAL-valued matrix, a 3-character
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1801:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char writematstem[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1802:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char outpath[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1803:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mxtype[3];
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1890:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          const char *fname,
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1914:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    file = fopen(fname, "w");
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2123:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VPUBLIC int writedataXML(NOsh *nosh, Vcom *com, const char *fname,
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2148:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    file = fopen(fname, "w");
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2389:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char writestem[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2390:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char outpath[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2391:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char title[72];
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2434:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(title, "CHARGE DISTRIBUTION (e)");
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2448:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(title, "POTENTIAL (kT/e)");
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2462:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(title,
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2478:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(title,
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2494:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(title, "SOLVENT ACCESSIBILITY -- VAN DER WAALS");
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2508:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(title,
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2524:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(title,
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2539:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(title, "ENERGY DENSITY (kT/e/A)^2");
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2553:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(title,
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2568:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(title,
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2583:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(title,
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2598:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(title,
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2613:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(title,
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2628:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(title,
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:2643:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(title,
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4306:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char writestem[VMAX_ARGLEN];    /**< @todo document */
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4307:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char outpath[VMAX_ARGLEN];      /**< @todo document */
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5389:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_tp[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5515:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char xyzr[VMAX_ARGLEN], surf[VMAX_ARGLEN], outname[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5532:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp=fopen(xyzr, "w");
data/apbs-3.0.0+dfsg1/apbs/src/routines.h:368:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VEXTERNC int writedataFlat(NOsh *nosh, Vcom *com, const char *fname,
data/apbs-3.0.0+dfsg1/apbs/src/routines.h:390:56:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VEXTERNC int writedataXML(NOsh *nosh, Vcom *com, const char *fname,
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/analysis.c:91:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char scalarPath[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/analysis.c:93:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char maskPath[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/benchmark.c:24:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char test_string[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/benchmark.c:25:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/benchmark.c:69:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(test_string, "integer %d double %4.3f exponential %12.5e\n",
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/del2dx.c:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/del2dx.c:72:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	pfile = fopen(inpath, "r+b");
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/del2dx.c:129:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	pfile = fopen(outpath, "w");
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/dxmath.c:40:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/dxmath.c:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char format[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/dxmath.c:42:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char gridPath[DXM_MAXOP+1][VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char outname[80];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx.c:50:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(outname,"gridmerged.dx");
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx.c:244:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx.c:491:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    (*pad) = atoi(argv[i]);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx.c:522:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                (*nx) = atoi(argv[i]);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx.c:523:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                (*ny) = atoi(argv[i+1]);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx.c:524:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                (*nz) = atoi(argv[i+2]);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:20:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VPRIVATE int Char_parseARGV(int argc, char **argv,
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:24:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  int *spec, char *outname, char fnams[MAX_INPUT_2][MAX_INPUT_PATH], int *numfnams,
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:24:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  int *spec, char *outname, char fnams[MAX_INPUT_2][MAX_INPUT_PATH], int *numfnams,
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fnams[MAX_INPUT_2][MAX_INPUT_PATH];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char outname[MAX_INPUT_PATH];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:126:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(outname,"gridmerged.dx");
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:431:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:564:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
VPRIVATE int Char_parseARGV(int argc, char **argv,
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:568:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  int* spec, char *outname, char fnams[MAX_INPUT_2][MAX_INPUT_PATH], int *numfnams,
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/mergedx2.c:568:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  int* spec, char *outname, char fnams[MAX_INPUT_2][MAX_INPUT_PATH], int *numfnams,
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/multivalue.c:130:27:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((inputFileStream = fopen(inputFileName,"r")) == NULL){
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/multivalue.c:138:28:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((outputFileStream = fopen(outputFileName,"w")) == NULL){
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:116:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int readTransform(char *path, double rotMat[3][3], double dispVec[3]) {
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tok[VMAX_BUFSIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:260:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char scalar1Path[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:262:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char scalar2Path[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:264:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char transformPath[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:266:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mask1Path[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:268:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mask2Path[VMAX_ARGLEN];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/smooth.c:67:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char inPath[VMAX_BUFSIZE]; int gotInPath = 0;
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/smooth.c:68:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char outPath[VMAX_BUFSIZE]; int gotOutPath = 0;
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/tensor2dx.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/tensor2dx.c:71:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		nx = atoi(argv[1]);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/tensor2dx.c:72:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ny = atoi(argv[2]);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/tensor2dx.c:73:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		nz = atoi(argv[3]);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/tensor2dx.c:93:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	pfile1 = fopen(origin,"r");
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/tensor2dx.c:94:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	pfile2 = fopen(data,"r");
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/tensor2dx.c:114:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	pfile3 = fopen(outpath, "w");
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/uhbd_asc2bin.c:16:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char newfile[256];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/uhbd_asc2bin.c:17:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char flnm[256];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/uhbd_asc2bin.c:18:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char title[72];
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/uhbd_asc2bin.c:32:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    inFile = fopen(flnm, "r");
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/uhbd_asc2bin.c:44:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    outFile = fopen(newfile, "wb");
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:585:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char hex[17] = "0123456789abcdef";
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:720:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[SWIG_PYBUFFER_SIZE * 2];
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:1378:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result[SWIG_BUFFER_SIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:1699:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result[SWIG_BUFFER_SIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:1713:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result[SWIG_BUFFER_SIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:1724:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result[SWIG_BUFFER_SIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:1842:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pack, ptr, size);
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:1860:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, sobj->pack, size);
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:2366:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mesg[256];
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:2707:22:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    *cptr = (char *)memcpy((char *)malloc((len + 1)*sizeof(char)), cstr, sizeof(char)*(len + 1));
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:406:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char hex[17] = "0123456789abcdef";
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:648:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result[SWIG_BUFFER_SIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:661:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result[SWIG_BUFFER_SIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:669:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result[SWIG_BUFFER_SIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:859:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result[SWIG_BUFFER_SIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:874:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result[SWIG_BUFFER_SIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:885:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char result[SWIG_BUFFER_SIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:982:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pack, ptr, size);
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:997:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, self->pack, size);
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:1107:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mesg[256];
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:1276:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[SWIG_BUFFER_SIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:1309:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[SWIG_BUFFER_SIZE];
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:3093:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    obj = PyString_FromString((char *) constants[i].pvalue);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:123:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
l=strlen(file_name_x);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:124:1:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
strncpy(mid, &file_name_x[5], l - 3 - 5); 
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:126:1:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
strncpy(file_name_y, "diely", 5);  /* take off the .dx */  
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:133:1:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
strncpy(file_name_z, "dielz", 5);  /* take off the .dx */
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:140:1:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
strncpy(file_name_k, "kappa", 5);  
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:147:1:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
strncpy(file_name_c, "charge", 6); 
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:186:1:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
fscanf(in, "%6s %1s %5s %13s %6s %i %i %i \n", s,s,s,s,s,&dim_x,&dim_y,&dim_z);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:187:1:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
fscanf(in, "%6s %f %f %f \n",s, &x0_x, &y0_x, &z0_x);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:188:1:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
fscanf(in, "%5s %f %f %f \n",s, &dx, &tmp, &tmp);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:189:1:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
fscanf(in, "%5s %f %f %f \n",s, &tmp, &dy, &tmp);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:190:1:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
fscanf(in, "%5s %f %f %f \n",s, &tmp, &tmp, &dz);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:192:1:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
fscanf(in, "%6s %i %5s %5s %4s %6s %4s %i %5s %i %4s %7s \n",s,&tmp,s,s,s,s,s,&tmp,s,&dim3,s,s);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:291:1:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
fscanf(in, "%6s %f %f %f \n",s, &x0_y, &y0_y, &z0_y);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:296:1:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
fscanf(in, "%6s %i %5s %5s %4s %6s %4s %i %5s %i %4s %7s \n",s,&tmp,s,s,s,s,s,&tmp,s, &tmp,s,s); 
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:351:1:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
fscanf(in, "%6s %f %f %f \n",s, &x0_z, &y0_z, &z0_z);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:356:1:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
fscanf(in, "%6s %i %5s %5s %4s %6s %4s %i %5s %i %4s %7s \n",s,&tmp,s,s,s,s,s,&tmp,s, &tmp,s,s);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:416:1:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
fscanf(in, "%6s %f %f %f \n",s, &x0, &y0, &z0);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:587:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
l=strlen(file_name_x);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:588:1:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
strncpy(f1, file_name_x, l-3);  /* take off the .dx */
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:629:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
l=strlen(file_name_y);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:630:1:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
strncpy(f2, file_name_y, l-3);  /* take off the .dx */
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:671:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
l=strlen(file_name_z);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:672:1:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
strncpy(f3, file_name_z, l-3);  /* take off the .dx */
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:713:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
l=strlen(file_name_k);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:714:1:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
strncpy(f4, file_name_k, l-3);  /* take off the .dx */
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:754:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
l=strlen(file_name_c);
data/apbs-3.0.0+dfsg1/apbs/examples/helix/draw_membrane2.c:755:1:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
strncpy(f5, file_name_c, l-3);  /* take off the .dx */
data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:920:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            bufsize = strlen(diriCubeString);
data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:922:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(buf, diriCubeString, VMAX_BUFSIZE);
data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:926:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            bufsize = strlen(neumCubeString);
data/apbs-3.0.0+dfsg1/apbs/src/fem/vfetk.c:929:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(buf, neumCubeString, VMAX_BUFSIZE);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:608:13:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
            strcpy(strnew, "");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:609:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            while (tok[strlen(tok)-1] != '"') {
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:611:17:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                strcat(str, " ");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:615:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:615:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:621:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(thee->molpath[thee->nmol], tok, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:627:13:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
            strcpy(strnew, "");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:628:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            while (tok[strlen(tok)-1] != '"') {
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:630:17:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                strcat(str, " ");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:634:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:634:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:640:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(thee->molpath[thee->nmol], tok, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:646:13:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
            strcpy(strnew, "");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:647:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            while (tok[strlen(tok)-1] != '"') {
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:649:17:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                strcat(str, " ");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:653:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:653:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:659:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(thee->molpath[thee->nmol], tok, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:685:13:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
            strcpy(strnew, "");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:686:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            while (tok[strlen(tok)-1] != '"') {
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:688:17:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                strcat(str, " ");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:692:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:692:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:701:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(thee->parmpath, tok, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:707:13:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
            strcpy(strnew, "");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:708:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            while (tok[strlen(tok)-1] != '"') {
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:710:17:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                strcat(str, " ");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:714:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:714:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:723:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(thee->parmpath, tok, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:760:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(strnew, "");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:761:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        while (tok[strlen(tok)-1] != '"') {
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:763:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(str, " ");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:767:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:767:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:772:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(thee->dielXpath[thee->ndiel], tok, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:776:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(thee->dielYpath[thee->ndiel], tok, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:780:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(thee->dielZpath[thee->ndiel], tok, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:814:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(strnew, "");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:815:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        while (tok[strlen(tok)-1] != '"') {
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:817:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(str, " ");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:821:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:821:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:827:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(thee->kappapath[thee->nkappa], tok, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:859:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(strnew, "");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:860:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        while (tok[strlen(tok)-1] != '"') {
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:862:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(str, " ");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:866:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:866:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:872:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(thee->potpath[thee->npot], tok, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:905:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(strnew, "");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:906:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        while (tok[strlen(tok)-1] != '"') {
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:908:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(str, " ");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:912:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:912:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:918:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(thee->chargepath[thee->ncharge], tok, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:940:13:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
            strcpy(strnew, "");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:941:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            while (tok[strlen(tok)-1] != '"') {
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:943:17:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                strcat(str, " ");
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:947:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:947:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:953:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(thee->meshpath[thee->nmesh], tok, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:1222:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(thee->elecname[thee->nelec], tok, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:1348:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(thee->apolname[thee->napol], tok, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:3139:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(parm->dxname, pbeparm->writestem[pbeparm->numwrite -1], CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/nosh.c:3268:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(parm->dxname, pbeparm->writestem[pbeparm->numwrite - 1], CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:282:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(thee->runtype, tok, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:297:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(thee->runname, tok, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:344:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(thee->units, tok, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:400:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(thee->grid2Dname[thee->grid2Dct], tok, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:408:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(thee->grid2Dax[thee->grid2Dct], tok, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:452:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(thee->termcombine, tok, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:500:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
       strncpy(thee->moveType[molind], tok, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:563:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    	   strncpy(thee->termnam[thee->termct], tok, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:573:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(thee->confil[thee->confilct], tok, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbamparm.c:656:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
       strncpy(thee->xyzfil[mol][thee->xyzct[mol]], tok, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1152:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(strnew, "");
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1153:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        while (tok[strlen(tok)-1] != '"') {
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1155:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(str, " ");
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1159:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1159:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1163:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(thee->writestem[thee->numwrite], tok, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1194:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(strnew, "");
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1195:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        while (tok[strlen(tok)-1] != '"') {
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1197:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(str, " ");
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1201:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1201:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncpy(strnew, str+1, strlen(str)-2);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbeparm.c:1204:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(thee->writematstem, tok, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c:174:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
       strncpy(thee->surffil[thee->surfct], tok, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c:211:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
       strncpy(thee->imatfil[thee->imatct], tok, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/pbsamparm.c:226:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
       strncpy(thee->expfil[thee->expct], tok, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:215:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(tok) < VMAX_ARGLEN) strcpy(atomName, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:233:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(tok) < VMAX_ARGLEN) strcpy(resName, tok);
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:262:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(tok) == 1) {
data/apbs-3.0.0+dfsg1/apbs/src/generic/valist.c:759:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(endtag,"/");
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:348:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(endtag,"/");
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:628:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              if (strlen(tok) > VMAX_ARGLEN) {
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:630:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
(%d)!\n", tok, strlen(tok));
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:699:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(tok) > VMAX_ARGLEN) {
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:701:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          tok, strlen(tok));
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:706:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(tok) > VMAX_ARGLEN) {
data/apbs-3.0.0+dfsg1/apbs/src/generic/vparam.c:708:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          tok, strlen(tok));
data/apbs-3.0.0+dfsg1/apbs/src/generic/vstring.c:165:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen( str );
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1158:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    gzwrite(outfile, header, strlen(header)*sizeof(char));
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1168:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    gzwrite(outfile, line, strlen(line)*sizeof(char));
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1172:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        gzwrite(outfile, newline, strlen(newline)*sizeof(char));
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1180:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        gzwrite(outfile, newline, strlen(newline)*sizeof(char));
data/apbs-3.0.0+dfsg1/apbs/src/mg/vgrid.c:1189:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    gzwrite(outfile, footer, strlen(footer)*sizeof(char));
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1810:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(pbeparm->writematstem) > strlenmax) {
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1819:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((int)strlen(pbeparm->writematstem) > strlenmax) {
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:1834:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((int)strlen(pbeparm->writematstem) > strlenmax) {
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4993:5:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
    sprintf(tabiparm->fpath, "");
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:4994:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(tabiparm->fname, nosh->molpath[0],4);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5244:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(pbamIn.runType_, parm->runtype, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5245:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(pbamIn.runName_, parm->runname, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5253:27:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  if(parm->setunits == 1) strncpy(pbamIn.units_, parm->units, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5257:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(pbamIn.map3D_, parm->map3dname, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5261:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(pbamIn.grid2D_[i], parm->grid2Dname[i], CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5262:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(pbamIn.grid2Dax_[i], parm->grid2Dax[i], CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5265:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(pbamIn.dxname_, parm->dxname, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5269:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(pbamIn.termCombine_, parm->termcombine, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5291:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(pbamIn.xyzfil_[i][j], parm->xyzfil[i][j], CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5298:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(pbamIn.moveType_[i], parm->moveType[i], CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5305:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(pbamIn.termnam_[i], parm->termnam[i], CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5312:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(pbamIn.confil_[i], parm->confil[i], CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5417:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(pbamIn.runType_, parm->runtype, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5418:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(pbamIn.runName_, parm->runname, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5421:27:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  if(parm->setunits == 1) strncpy(pbamIn.units_, parm->units, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5429:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(pbamIn.map3D_, parm->map3dname, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5433:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(pbamIn.grid2D_[i], parm->grid2Dname[i], CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5434:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(pbamIn.grid2Dax_[i], parm->grid2Dax[i], CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5437:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(pbamIn.dxname_, parm->dxname, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5441:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(pbamIn.termCombine_, parm->termcombine, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5463:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(pbamIn.xyzfil_[i][j], parm->xyzfil[i][j], CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5470:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(pbamIn.moveType_[i], parm->moveType[i], CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5477:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(pbamIn.termnam_[i], parm->termnam[i], CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5484:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(pbamIn.confil_[i], parm->confil[i], CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5495:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(pbsamIn.surffil_[i], samparm->surffil[i], CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5499:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(pbsamIn.imatfil_[i], samparm->imatfil[i], CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5503:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(pbsamIn.expfil_[i], samparm->expfil[i], CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/src/routines.c:5557:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(pbsamIn.surffil_[i], surf, CHR_MAXLEN);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/analysis.c:123:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(scalarPath, tstr, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/analysis.c:133:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(maskPath, tstr, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/dxmath.c:116:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(gridPath[0], tok, VMAX_BUFSIZE);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/dxmath.c:131:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(gridPath[numop+1], tok, VMAX_BUFSIZE);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:298:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(scalar1Path, tstr, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:305:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(scalar2Path, tstr, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:312:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(transformPath, tstr, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:322:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(mask1Path, tstr, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/tools/mesh/similarity.c:329:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(mask2Path, tstr, VMAX_ARGLEN);
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:356:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const char* te = tb + strlen(tb);
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:375:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const char* te = tb + strlen(tb);
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:633:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(name) + 1 > (bsz - (r - buff))) return 0;
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:654:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t lname = (name ? strlen(name) : 0);
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:659:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(r,name,lname+1);
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:757:91:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#  define PyString_AsStringAndSize(obj, s, len) {*s = PyString_AsString(obj); *len = *s ? strlen(*s) : 0;}
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:2726:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (psize) *psize = vptr ? (strlen((char *)vptr) + 1) : 0;
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:2759:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return SWIG_FromCharPtrAndSize(cptr, (cptr ? strlen(cptr) : 0));
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:8069:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t size = strlen(name)+1;
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:8072:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(gv->name,name,size);
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:8134:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              strlen(const_table[j].name)) == 0) {
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:8143:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t lptr = strlen(ty->name)+2*sizeof(void*)+2;
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:8149:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
              strncpy(buff, methods[i].ml_doc, ldoc);
data/apbs-3.0.0+dfsg1/apbs/tools/python/apbslib.c:8151:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
              strncpy(buff, "swig_ptr: ", 10);
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:184:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const char* te = tb + strlen(tb);
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:203:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const char* te = tb + strlen(tb);
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:454:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(name) + 1 > (bsz - (r - buff))) return 0;
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:475:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t lname = (name ? strlen(name) : 0);
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:480:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(r,name,lname+1);
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:1576:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (psize) *psize = vptr ? (strlen(vptr) + 1) : 0;
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:3062:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            size_t size = strlen(name)+1;
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:3065:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(gv->name,name,size);
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:3134:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strlen(const_table[j].name)) == 0) {
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:3143:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    size_t lptr = strlen(ty->name)+2*sizeof(void*)+2;
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:3149:29:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                            strncpy(buff, methods[i].ml_doc, ldoc);
data/apbs-3.0.0+dfsg1/apbs/tools/python/vgrid/vgridlib.c:3151:29:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
                            strncpy(buff, "swig_ptr: ", 10);

ANALYSIS SUMMARY:

Hits = 877
Lines analyzed = 163869 in approximately 5.05 seconds (32458 lines/second)
Physical Source Lines of Code (SLOC) = 105202
Hits@level = [0] 682 [1] 207 [2] 469 [3]  23 [4] 178 [5]   0
Hits@level+ = [0+] 1559 [1+] 877 [2+] 670 [3+] 201 [4+] 178 [5+]   0
Hits/KSLOC@level+ = [0+] 14.8191 [1+] 8.33634 [2+] 6.3687 [3+] 1.91061 [4+] 1.69198 [5+]   0
Dot directories skipped = 4 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.