Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/sfx.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/hash.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/list.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/except.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/list.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/hash.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/dict.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/dict.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/tests/paf-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilerrno.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilframeset.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltimer.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pillist.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilframe.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilframeset.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltask.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcatmap.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pillist.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/md5.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildate.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilkeymap.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilalias.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilstrutils.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildictionary.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt1.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilkeyword.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcatmap.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilutils.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmemory.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildate.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilframe.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmemory.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilerrno.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltask.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilstrutils.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilalias.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilkeyword.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmacros.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcdb.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilutils.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilastroutils.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilastroutils.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcdb.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilkeymap.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/md5.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltimer.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildictionary.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_bpm_fit.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_sigclip.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_overscan_defs.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_catalogue.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_bpm_3d.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/igam.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_test.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_sigclip.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_image.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_fit.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_flat.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_elemop.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_elemop.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_random.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_lacosmics.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_prototyping.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_fringe.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_prototyping.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_strehl.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_imagelist_view.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_frameiter.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_imagelist_view.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_image.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_frameiter.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_image_math.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_image_math.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_bpm_2d.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_bpm_2d.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_bpm_fit.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_combine.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_multiiter.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_iter.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_utils.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_parameter_defs.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_catalogue.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_imagelist_basic.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_lacosmics.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_strehl.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_image_defs.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_buffer.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_collapse.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_parameter.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_bpm_utils.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_overscan.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_random.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_combine.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_iter.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_bpm_utils.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_imagelist.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_utils-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_elemop-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_strehl-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_buffer-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_frameiter-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_fringe-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_random-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_image-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_bpm_2d-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_overscan-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_collapse-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_parameter-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_imagelist_basic-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_catalogue-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_bpm_utils-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_combine-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_lacosmics-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_bpm_3d-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_imagelist_view-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_bpm_fit-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_imagelist_io-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_flat-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_sigclip-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_fit-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_imagelist_io.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_flat.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_fit.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_imagelist_basic.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_types.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_collapse.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_parameter.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_utils.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_multiiter.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_overscan.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/create_table_6.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/imcore_background.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/casu_utilfunctions.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/apinit.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/moments.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/imcore_conf.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/imcore_overlp.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/casu_utilfunctions.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/polynm.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/imcore_filter.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/classify.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/apclust.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/create_table.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/classify.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/seeing.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/areals.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/imcore_version.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/floatmath.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/tests/hdrl_casubkg_badpatch-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/tests/imcore_moments-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/tests/imcore_apinit-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/tests/imcore_conf-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/tests/imcore_classify-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/tests/imcore_polynm-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/tests/hdrl_casuaddmul-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/tests/hdrl_simulerror_montecarlo-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/tests/casu_imcore-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/tests/imcore_radii-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/tests/imcore_background-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/tests/imcore_seeing-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/tests/imcore_areals-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/imcore_phopt.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/imcore_radii.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/terminate.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/imcore_extend.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/solve.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/ap.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/apline.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/util.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/imcore.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/imcore_radii.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_bpm_3d.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_buffer.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_imagelist_basic_body.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_fringe.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_imagelist_defs.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_imagelist_io.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/wavelength_calibration.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/flat_combine.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/extinction.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/statistics.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/image_smooth.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/rect_region.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/image_spline_fit.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/calibrated_slit.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/reduce_method.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/ccd_config.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/global_distortion.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/response.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/detected_slits.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/mosca_image.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/spectrum.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/ccd_config.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/spec_std_star.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/statistics.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/vector_utils.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/extinction.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/grism_config.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/slit_trace_distortion.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/vector_utils.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/profile_providers.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/slit_trace_distortion.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/spec_std_star.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/grism_config.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/image_normalisation.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/wavelength_calibration.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/mosca_image.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/global_distortion.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/detected_slit.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/tests/fiera_config-test.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/tests/flat_combine-test.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/tests/image_smooth-test.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/tests/image_normalisation-test.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/image_utils.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/spectrum.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/detected_slits.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/spatial_distortion.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/rect_region.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/fiera_config.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/reduce_method.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/fiera_config.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/image_smooth.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/calibrated_slit.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/type_traits.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/spatial_distortion.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/detected_slit.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/response.cpp Examining data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucombine.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_fringe.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmbias.cc Examining data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_dark.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_bias.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_calib.cc Examining data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_det_noise.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmdark.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_science.cc Examining data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_twilight_flat.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmspphot.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmdet.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucombinecube.cc Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_distortion.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_oddeven.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_polynomial.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_stdstar.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_flat.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_calib.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_wavecal.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_ksigma_clip.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_slitpos.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_wcs.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_calib.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_plugin.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_polynomial.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_hist.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_wlxcorr.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_ppm.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_slitpos.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_mkmaster.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_plugin.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_ksigma_clip_body.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_cat.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_match_cats.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_framelist.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_spectrum.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_framelist.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_oddeven.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_utils.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_wcs.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_wlxcorr.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_wavecal.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_spectrum.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_flat.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/tests/irplib_cat-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/tests/irplib_utils-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/tests/irplib_sdp_spectrum-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/tests/irplib_wlxcorr-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/tests/irplib_strehl-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/tests/irplib_plugin-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/tests/irplib_hist-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/tests/irplib_framelist-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/tests/irplib_wcs-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/tests/irplib_polynomial-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_stdstar.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_ppm.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_strehl.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_wavecal_impl.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_cat.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_strehl.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_utils.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_match_cats.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_sdp_spectrum.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_mkmaster.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_distortion.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_ksigma_clip.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_hist.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_sdp_spectrum.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_mask.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_platesol.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_wcsutils.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_photcal_extinct.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_nebuliser.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_tfits.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_filt.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_imdither.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_defringe.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_darkcor.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_wcsutils.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_fits.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_utils.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_nditcor.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_genbpm.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_gaincor.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_sky.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_filt.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_stats.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_fits.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_match.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_stats.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_tfits.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_flatcor.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_opm.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_pawsky_minus.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_mods.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_mkconf.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_inpaint.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_sky.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_genbpm-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_flatcor-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_mkconf-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_darkcor-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_photcal_extinct-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_filt-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_imdither-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_nditcor-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_nebuliser-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_tfits-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_imcombine-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_mask-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_wcsutils-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_platesol-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_imcore-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_backmap-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_pawsky_minus-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_sky-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_match-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_getstds-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_gaincor-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_fits-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_imstack-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_opm-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_inpaint-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_stats-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_imcombine.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_backmap.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_imcore.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_utils.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_mask.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_4.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_6.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_2.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/imcore_background.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/apinit.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/moments.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/imcore_conf.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_3.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/imcore_overlp.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/polynm.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/imcore_filter.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/classify.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/apclust.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_1.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/classify.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/seeing.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/areals.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/imcore_version.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/floatmath.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/tests/imcore_moments-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/tests/imcore_apinit-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/tests/imcore_conf-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/tests/imcore_classify-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/tests/imcore_polynm-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/tests/imcore_radii-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/tests/imcore_background-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/tests/imcore_seeing-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/tests/imcore_areals-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/tests/imcore_opm-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/imcore_opm.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/imcore_phopt.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/imcore_radii.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/terminate.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/imcore_extend.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/solve.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/ap.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/apline.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/util.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/imcore.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/imcore_radii.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_imstack.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/lvimoswcs.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/polyfit.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/worldpos.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscon.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fortcat.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/median.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/matchstar.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fileutil.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tnxpos.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/platefit.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/proj.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/lin.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ujcread.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/sph.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dsspos.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/findstar.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscat.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/slasubs.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcstrig.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcspoly.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/sortstar.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/cel.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitshead.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsfort.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imsetvimoswcs.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fortvimoswcs.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/daoread.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imio.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imio.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/platepos.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tnxfit.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_lines.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmfit.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmossphotcalib.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_detected_slits.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwindowtable.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_calibrated_slits.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_ifu_wcs.cc Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_grism.cc Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmsphottable.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_var.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_overscan.cc Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmcube.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmextincttable.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmidstable.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_imaging_utils.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmextractiontable.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmqcutils.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_calib_mult.cc Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmstdfluxtable.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_overscan.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimagearray.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmccdtable.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmcpl.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifutable.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmdetector.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_calib_mult.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmcpl.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/two_d_linear_wcs.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/two_d_linear_wcs.cc Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimage.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmdistmodels.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmfit.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmadfifutable.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_detmodel.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgpreprocessing.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_flat_normalise.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmccdtable.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_calibrated_slits.cc Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmoswavecalib.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_science_impl.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwcsutils.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_chop_region.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmidstable.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmdetector.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmath.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_utils.cc Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmspecphottable.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmath.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifufibers.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_detected_slits.cc Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmobjecttable.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmatrix.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_ifu_wcs.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmossphotcalib.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtablearray.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimagearray.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimageset.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmsphottable.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimage.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmgrismtable.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmstarmatchtable.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_chop_region.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmstdfluxtable.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_response.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmgrismtable.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifutypes.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmcube.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmadf.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifuextraction.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/fors_tools.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_chop_lowconf.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmextincttable.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifusky.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_spec_idp.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifusphotcalib.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifuutils.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_var.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmstartable.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_grism.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtypes.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_imaging_utils.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifutypes.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifuimage.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_detmodel.cc Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimageset.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmdistmodels.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_biascor.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_response.cc Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifusky.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmlinecatalog.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmadfifutable.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwindowtable.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifuflat.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmoswavecalib.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/tests/vimos_var-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/tests/vimos_chop_region-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/tests/vimos_chop_lowconf-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/tests/vimos_utils-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/tests/vimos_biascor-test.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifuutils.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_biascor.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmspecphottable.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmqcutils.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifutable.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifuextraction.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmstartable.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_utils.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_spec_idp.cc Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_lines.cc Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_calib_impl.cc Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_pfits.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmobjecttable.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtypes.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmatrix.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmstarmatchtable.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifufibers.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_calib_impl.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifusphotcalib.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_flat_normalise.cc Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgpreprocessing.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_chop_lowconf.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_mods.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwcsutils.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmextractiontable.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtablearray.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/fors_tools.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_pfits.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmlinecatalog.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_science_impl.cc Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifuflat.c Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmadf.h Examining data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifuimage.c FINAL RESULTS: data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1518:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void)strncat(buf,"&",BUFSIZ); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1519:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void)strncat(buf,url_encode(buf2),BUFSIZ); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1524:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void)strncat(buf,"&",BUFSIZ); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1525:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void)strncat(buf,url_encode(buf2),BUFSIZ); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1531:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void)strncat(buf,"&",BUFSIZ); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1532:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void)strncat(buf,url_encode(buf2),BUFSIZ); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1538:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void)strncat(buf,"&",BUFSIZ); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1539:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void)strncat(buf,url_encode(buf2),BUFSIZ); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1541:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void)strncat(buf,"&",BUFSIZ); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1542:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void)strncat(buf,url_encode(buf2),BUFSIZ); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1544:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void)strncat(buf,"&",BUFSIZ); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1545:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void)strncat(buf,url_encode(buf2),BUFSIZ); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1547:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void)strncat(buf,"&",BUFSIZ); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1548:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void)strncat(buf,url_encode(buf2),BUFSIZ); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:972:8: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void)strncat (newpixname, &pixname[4], SZ_IM2PIXFILE); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:990:8: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void)strncat (newpixname, pixname, SZ_IM2PIXFILE); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1176:6: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(path, 0644) == -1) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1206:7: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(path, 0444) == -1) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1383:6: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(dstfile, 0644) == -1) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1413:7: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(dstfile, 0444) == -1) data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_fits.c:140:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(extname,cpl_propertylist_get_string(eh,"EXTNAME")); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_fits.c:154:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(extname,cpl_propertylist_get_string(eh,"EXTNAME")); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:197:15: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void)strcpy(catname2,cdscatname); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:200:15: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void)strcpy(catname2,catname); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1228:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(newname,0) != 0) data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1243:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(newname,F_OK) != 0) data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1402:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf,"GET /viz-bin/asu-fits?%s HTTP/1.0\r\n\r\n",req_string); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_mask.c:117:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(cpl_frame_get_filename(master_mask),R_OK) != 0) { data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_utils.c:912:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access((const char *)*catpath,R_OK) != 0) { data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_fits-test.c:65:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(testfile,F_OK) == 0) data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_fits-test.c:114:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(str,"%s[%s]",testfile,"TESTEXTN"); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_mask-test.c:63:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(fname,F_OK) == 0) data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_tfits-test.c:65:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(testfile,F_OK) == 0) data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_tfits-test.c:114:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(str,"%s[%s]",testfile,"TESTTAB"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c:560:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (path,"%s/data2/act%1d.dat", cdpath, regnum); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c:564:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (path,"%s/data1/act%04d.dat", cdpath, regnum); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c:597:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (sc->isfil, actfile); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:94:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (cdn,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:96:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (cds,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:406:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (cdn,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:408:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (cds,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:634:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (tabpath,cdn); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:645:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (tabpath,cds); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:895:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (path,"%s/agasc/%s/%04d.fit", cdn, zdir[zone], regnum); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:899:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (path,"%s/agasc/%s/%04d.fit", cds, zdir[zone], regnum); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:119:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (str, sc->caturl); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:300:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (objname, star->objname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:332:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (objname, star->objname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:364:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (objname, star->objname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:463:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (str, starcat->caturl); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:567:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (objname, star->objname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:617:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (bindir, str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:628:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (bindir, str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:638:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (bindir, str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:656:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (binpath, bindir); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:658:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (binpath, bincat); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:666:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (binpath, bincat); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:729:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (sc->incdir, bindir); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:730:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (sc->incfile, bincat); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:739:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (sc->isfil, binfile); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:244:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (objname, star->objname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:269:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (objname, star->objname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:295:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (objname, star->objname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:501:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (objname, star->objname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:569:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (catdir, str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:570:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (catpath, catdir); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:572:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (catpath, catfile); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:580:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (catpath, catfile); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:860:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st->objname, token); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:969:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st->objname, token); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:116:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (title, "USNO %s Stars", refcatname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:249:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (title, "USNO %s Stars", refcatname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:253:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (title, refcatname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:265:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (title, refcatname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:277:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (title, refcatname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:350:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (progpath, progpath0); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:509:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf (numstr, nform, dnum); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:513:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf (numstr, nform, dnum+0.49); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:517:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf (numstr, nform, (int)(dnum+0.49)); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:521:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf (numstr, nform, (int)(dnum+0.49)); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1274:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access (filename, R_OK)) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1326:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (skey, keyword); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1334:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (skey, keyword); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1343:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (skey, keyword); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:299:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (objname, star->objname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:328:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (objname, star->objname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:358:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (objname, star->objname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:584:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (objname, star->objname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:652:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (catpath, str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:654:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (catpath, catdir); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:656:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (catpath, catfile); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:664:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (catpath, catfile); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:694:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (sc->isfil, catname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:1024:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st->objname, token); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:1169:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st->objname, token); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:223:6: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf (tstring, outform, ihr, imn, sec); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:227:6: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf (tstring, outform, ihr, imn, (int)(sec+0.5)); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:237:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (string, tstring); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:239:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (string, dstring); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:241:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (string, "%sT%s", dstring, tstring); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/findstar.c:31:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). {strcpy (imcatname, cat); return; } data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:131:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (extnam, ext+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:684:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (pw[ifield].kname,temp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:721:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (rw[ik].kname, pw[ifield].kname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:903:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access (filename, 0)) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:942:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access (filename, 0)) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:1180:10: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access (filename, 0)) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:1266:10: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access (filename, 0)) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:357:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). { strcpy (vimoswcsproj, type); return; } data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:404:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (wcstemp, vimoswcsproj); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:407:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (wcstemp, vimoswcsproj); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fortvimoswcs.c:237:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (radecsys, vimoswcs->radecsys); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:118:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (cdn,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:120:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (cds,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:441:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (cdn,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:443:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (cds,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:668:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (tabpath,cdn); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:679:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (tabpath,cds); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:929:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (path,"%s/gsc/%s/%04d.gsc", cdn, zdir[zone], regnum); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:933:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (path,"%s/gsc/%s/%04d.gsc", cds, zdir[zone], regnum); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:121:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (val, value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:170:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (val, value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:217:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (val, value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:314:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (val, value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:353:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (val, value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:549:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (keywordi, "%s_1", keyword); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:553:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (keywordi, "%s_01", keyword); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:557:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (keywordi, "%s_001", keyword); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:567:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf (keywordi, keyform, keyword, ikey); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:574:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (stri, value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:623:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (str, value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:811:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (cval,v1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:828:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (cval,cpar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:845:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (cval, v1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:148:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf (value, format, dval); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:154:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf (value, format, dval); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:248:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (keyroot, keyword); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:260:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (newkey, keyroot); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:868:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (string, tstring); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1010:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (string, tstring); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1053:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf (tstring, degform, deg1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1057:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf (tstring, degform, (int)deg1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1062:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (string, tstring); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1087:6: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf (string, numform, num); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1091:6: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf (string, numform, (int)num); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1097:6: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf (string, numform, num); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c:172:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (val, value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c:213:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (val, value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c:252:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (val, value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c:283:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (val, value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c:317:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (str, value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c:358:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (keyword,keyword0); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c:404:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (cval,cpar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c:412:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (cval, line); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:126:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (temp, ctypes[ptype0]); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:129:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (temp, ctypes[ptype0]); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:304:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecsys, cstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:305:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecout, cstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:306:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecin, cstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:812:10: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access (hdrname, 0)) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:869:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (pixname, newpixname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:873:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (pixname, bang+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:875:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (pixname, pixn); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:908:10: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access (pixname, 0)) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:1140:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (temp,filename); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:1141:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (pixfile, temp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:1146:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (temp,pixfile); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:1147:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (pixfile, temp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:1166:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (temp,pixfile); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:1167:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (pixfile, temp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:103:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (history,"Copy of image %s bits per pixel %d -> %d", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:120:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (history,"Copy of image %s reflected",filename); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:144:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (history,"Copy of image %s reflected, rotated 90 degrees", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:156:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (history,"Copy of image %s rotated 90 degrees",filename); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:173:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (history,"Copy of image %s reflected, rotated 180 degrees", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:185:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (history,"Copy of image %s rotated 180 degrees",filename); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:200:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (history,"Copy of image %s reflected, rotated 270 degrees", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:212:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (history,"Copy of image %s rotated 270 degrees",filename); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:228:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (history,"Copy of image %s reflected top to bottom",filename); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imsetvimoswcs.c:842:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (matchcat, cat); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:96:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (rastr, *++av); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:98:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (decstr, *++av); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:155:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (rastr, *++av); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:157:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (decstr, *++av); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:190:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (outname, *++av); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:472:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (newname, outname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:491:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (newname, fname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:505:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (newname, imext+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:522:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (newname, temp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:529:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (pixname, newname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:536:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (newname, name); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:244:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (objname, star->objname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:275:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (objname, star->objname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:307:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (objname, star->objname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:503:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (objname, star->objname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:700:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (tvalue, value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:750:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (sc->isfil, tabname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1127:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (st->objname, cnum); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1245:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (tabname, tabcomma+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1253:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (taberr,"TABOPEN: Tab table file %s has no entries", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1262:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (taberr,"TABOPEN: Tab table file %s cannot be read", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1273:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (taberr,"TABOPEN: cannot allocate Tab Table structure for %s", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1285:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (taberr,"TABOPEN: cannot allocate filename %s in structure", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1292:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (tabtable->filename, tabfile); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1297:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (taberr,"TABOPEN: cannot allocate buffer for tab table %s", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1377:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (taberr,"TABOPEN: No - line in tab table %s",tabfile); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:516:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (tabpath, str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:521:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (tabpath, ty2cd); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:584:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (tabpath, str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:588:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (tabpath, ty2cd); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:762:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (ty2path, str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:767:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (ty2path, ty2cd); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:804:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (sc->isfil, ty2file); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:199:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (usa2path,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:205:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (usa1path,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:214:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (ua2path,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:217:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (cdroot,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:224:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (ua1path,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:227:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (cdroot,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:528:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (usa2path,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:534:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (usa1path,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:543:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (ua2path,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:546:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (cdroot,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:553:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (ua1path,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:556:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (cdroot,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:945:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (path,"%s/zone%04d.cat", uapath, zn); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:949:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (path,"%s/zone%04d.cat", uapath, zn); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:958:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (path,"%s/%s/zone%04d.cat", cdroot, cdname[icd-1], zn); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ujcread.c:114:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (cdu,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ujcread.c:373:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (cdu,str); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ujcread.c:683:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (path, catname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ujcread.c:691:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (path,"%s/ZONE%04d.CAT", cdu, zn); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ujcread.c:693:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (path,"%s/zone%04d.cat", cdu, zn); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:161:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->ptype,proj); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:164:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (vimoswcs->ctype[0],proj); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:165:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (vimoswcs->ctype[1],proj); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:290:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecout, vimoswcs->radecsys); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:353:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->ctype[0], ctype1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:354:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->c1type, ctype1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:355:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->ptype, ctype1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:393:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (vimoswcs->ctype[0],"%-4s%4s",vimoswcs->c1type,vimoswcs->ptype); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:475:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->ctype[1], ctype2); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:476:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->c2type, ctype2); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:528:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (vimoswcs->ctype[1],"%-4s%4s",vimoswcs->c2type,vimoswcs->ptype); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1106:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecsys,coorsys); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1474:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (comform, vimoswcs->command_format[i]); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1491:10: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. (void)sprintf(command, comform, xystring, filename); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1493:10: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. (void)sprintf(command, comform, filename, xystring); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1497:10: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. (void)sprintf(command, comform, xystring, filename, data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1500:10: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. (void)sprintf(command, comform, filename, xystring, data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1503:10: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. (void)sprintf(command, comform, filename, vimoswcstring, data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1508:10: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. (void)sprintf(command, comform, xystring, vimoswcstring, data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1511:10: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. (void)sprintf(command, comform, vimoswcstring, xystring, data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1514:10: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. (void)sprintf(command, comform, vimoswcstring, filename, data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1518:9: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. (void)sprintf(command, comform, xystring); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1520:9: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. (void)sprintf(command, comform, xystring, vimoswcstring); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1522:9: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. (void)sprintf(command, comform, vimoswcstring, xystring); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1527:9: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. (void)sprintf(command, comform, filename); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1529:9: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. (void)sprintf(command, comform, filename, vimoswcstring); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1531:9: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. (void)sprintf(command, comform, vimoswcstring, filename); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1534:12: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. (void)sprintf(command, comform, vimoswcstring); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1535:8: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. ier = system (command); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1561:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecout, vimoswcs->radecsys); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1609:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecout, coorsys); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1669:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecin, vimoswcs->radecsys); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1713:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecin, coorsys); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1835:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf (vimoswcstring,"%s %s", rastr, decstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1837:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf (vimoswcstring,"%s %s", rastr, decstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1862:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf (vimoswcstring,"%s %s", rastr, decstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1864:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf (vimoswcstring,"%s %s", rastr, decstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1939:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (vimoswcstring, vimoswcs->radecout); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1953:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (rastr, vimoswcs->units[0]); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1957:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (decstr, vimoswcs->units[1]); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1964:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf (vimoswcstring,"%s %s", rastr, decstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1966:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf (vimoswcstring,"%s %s", rastr, decstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1981:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (vimoswcstring, vimoswcs->units[0]); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1985:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (vimoswcstring, vimoswcs->units[1]); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:2339:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcsfile, filename); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:2348:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). { strcpy (vimoswcserrmsg, errmsg); return; } data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:2376:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). { strcpy (vimoswcscoor0, vimoswcscoor); return; } data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:2397:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcscom0[i], vimoswcscomm); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsfort.c:237:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (radecsys, vimoswcs->radecsys); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:287:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (ctype2, ctype1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:294:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->ctype[0], ctype1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:295:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->ctype[1], ctype2); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:610:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf (vimoswcs->center,"%2.0f:%2.0f:%5.3f %c%2.0f:%2.0f:%5.3f %s", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:828:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecout, vimoswcs->radecsys); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:831:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecin, vimoswcs->radecsys); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:958:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecsys,systring); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:132:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->ctype[0], ctype1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:133:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->ctype[1], ctype2); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:424:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf (vimoswcs->center,"%2.0f:%2.0f:%5.3f %c%2.0f:%2.0f:%5.3f %s", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:638:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecout, vimoswcs->radecsys); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:641:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecin, vimoswcs->radecsys); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:739:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecsys,systring); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:132:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->ctype[0], ctype1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:133:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->ctype[1], ctype2); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:424:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf (vimoswcs->center,"%2.0f:%2.0f:%5.3f %c%2.0f:%2.0f:%5.3f %s", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:638:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecout, vimoswcs->radecsys); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:641:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecin, vimoswcs->radecsys); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:739:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecsys,systring); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:287:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (ctype2, ctype1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:294:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->ctype[0], ctype1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:295:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->ctype[1], ctype2); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:610:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf (vimoswcs->center,"%2.0f:%2.0f:%5.3f %c%2.0f:%2.0f:%5.3f %s", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:827:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecout, vimoswcs->radecsys); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:830:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecin, vimoswcs->radecsys); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:957:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vimoswcs->radecsys,systring); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c:466:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(requir, "DEC--%s", vimoswcs->pcode); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c:472:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(requir, "RA---%s", vimoswcs->pcode); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c:478:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(requir, "%s-%s", vimoswcs->lattyp, vimoswcs->pcode); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c:484:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(requir, "%s-%s", vimoswcs->lngtyp, vimoswcs->pcode); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:95:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (srchurl, "?catalog=%s&ra=%.7f&dec=%.7f&system=%s&", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:100:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (srchurl, temp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:105:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (srchurl, temp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:108:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (srchurl, temp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:112:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (srchurl, temp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:116:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (srchurl, temp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:140:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (srchurl, temp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:142:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (srchurl, temp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:164:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (srchurl, temp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:167:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (srchurl, temp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:170:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (srchurl, temp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:244:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (numlist, numstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:247:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (numlist, numstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:252:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (srchurl, "?catalog=%s&num=%s&outsys=%s&",refcatname,numlist,csys); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:255:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (srchurl, temp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:332:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (srchurl, cgipart); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:333:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (srchurl, srchpar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:395:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (newbuff, tabbuff); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:417:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (tabbuff, linebuff); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:422:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (newbuff, tabbuff); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:426:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (tabbuff, linebuff); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:429:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (tabbuff, linebuff); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:454:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (tabtable->filename, caturl); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:464:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (tabtable->tabname, srchpar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:568:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(hostname, file); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_cat.c:89:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access((const char *)fname,R_OK) != 0) data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_plugin.c:1052:13: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. n = sscanf(line, LINE_SCAN_FMT, path, tag, group); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_utils.c:68:30: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. __attribute__((format (printf, 2, 3))) data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_wcs.c:252:12: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. nret = sscanf(iso8601, IRPLIB_ISO8601_FORMAT, pyear, pmonth, data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_wlxcorr.c:755:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(title_loc, data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_wlxcorr.c:788:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(title_loc, data/cpl-plugin-vimos-4.1.1+dfsg/irplib/tests/irplib_utils-test.c:482:19: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. cpl_test_zero(system("rm dummyon*.fits")); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcdb.c:829:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(parString[count], "%s=\"\"", db_key); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcdb.c:838:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(parString[count], "%s=\"%s\"", db_key, db_data->value); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcdb.c:844:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(parString[count], "%s=%s", db_key, db_data->value); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcdb.c:1081:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(grpname, PILCFG_GRP_DEFAULT); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:143:8: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. sz = vsnprintf(path, PIL_PATHNAME_MAX, fmt, ap); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:145:8: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. sz = vsprintf(path, fmt, ap); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:1046:37: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. const char *value, PilCdbKeyMode access) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:1053:46: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (pilCdbSetKeyMode(cfgDB, group, name, access) == EXIT_FAILURE) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:202:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(tpath, s); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilframeset.c:462:21: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. n = sscanf(sofline, "%s %s %s", path, tag, group); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:158:5: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(string, (size_t) MAX_MESSAGE_LENGTH, format, args); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:160:5: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(string, format, args); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:196:5: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(string, (size_t) MAX_MESSAGE_LENGTH, format, args); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:198:5: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(string, format, args); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:290:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(messageText, (size_t) MAX_MESSAGE_LENGTH, format, al); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:292:3: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(messageText, format, al); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:324:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(messageLog, ERROR_STRING); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:325:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(messageTerminal, ERROR_STRING); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:328:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(messageLog, WARNING_STRING); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:329:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(messageTerminal, WARNING_STRING); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:332:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(messageLog, INFO_STRING); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:333:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(messageTerminal, INFO_STRING); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:336:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(messageLog, DEBUG_STRING); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:337:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(messageTerminal, DEBUG_STRING); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:346:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(messageTerminal, recipeName); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:359:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(messageTerminal, functionName); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:363:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(messageLog, functionName); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:375:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(messageLog, messageText); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:376:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(messageTerminal, messageText); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:541:30: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. case PIL_MSG_DEBUG : fprintf(logfilePointer, DEBUG_STRING); break; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:542:30: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. case PIL_MSG_INFO : fprintf(logfilePointer, INFO_STRING); break; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:543:30: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. case PIL_MSG_WARNING : fprintf(logfilePointer, WARNING_STRING); break; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:544:30: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. case PIL_MSG_ERROR : fprintf(logfilePointer, ERROR_STRING); break; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:769:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(recipeName, name); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c:84:13: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(line, "Revision: %s", version); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c:118:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(pafName, "%s%.4d.paf", PAF_ROOT_NAME, pafIndex); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c:197:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(allComment, "%s %s", comment, INSTRUMENT); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c:248:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(allComment, "%s (%s) %s", comment, unit, INSTRUMENT); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c:250:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(allComment, "%s %s", comment, INSTRUMENT); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c:297:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(allComment, "%s (%s) %s", comment, unit, INSTRUMENT); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c:299:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(allComment, "%s %s", comment, INSTRUMENT); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:630:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(optname, "%s, -%c", common_options[i].opt.name, data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:632:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(optfmt, " --%%-%lus %%s\n", (unsigned long)sz + 4); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:633:7: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(message, optfmt, optname, common_options[i].comment); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:637:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(optfmt, " --%%-%lus %%s\n", (unsigned long)sz); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:638:7: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(message, optfmt, common_options[i].opt.name, data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:656:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(optfmt, " --%%-%lus %%s [%%s]\n", (unsigned long)sz); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:658:7: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(message, optfmt, parg[i].name, parg[i].comment, parg[i].value); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1013:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s/%s", path, prefix); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1019:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s/%s_%04d", path, prefix, count); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1043:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s/%s", path, pilRecGetName()); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1049:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s/%s_%04d", path, pilRecGetName(), count); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1061:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s/%s", path, category); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1161:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(srcfile, pilFrmGetName(frame)); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1163:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(srcfile, R_OK)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1173:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access(path, F_OK)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1175:11: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(path, R_OK | W_OK)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1256:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(linkname, "%s/%s", e_path, s); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1263:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(p_path, R_OK)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1361:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(srcfile, "%s/%s", cwd, filename); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1363:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(dstfile, "%s/%s.log", path, prefix); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1370:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(filename, R_OK)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1380:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access(dstfile, F_OK)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1382:11: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(dstfile, R_OK | W_OK)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1998:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(logfile_dir, tdir); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:2139:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(product_dir, tdir); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:2149:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(product_dir, F_OK)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:2155:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(product_dir, R_OK | W_OK)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:2172:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(export_dir, tdir); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:2176:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(export_dir, F_OK)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:2182:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(export_dir, R_OK | W_OK)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:2669:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(name, F_OK)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:2674:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(name, R_OK)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltask.c:211:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(argv[0], F_OK | X_OK)) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltimer.c:493:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tstring, "%3s %3s %2d %2d:%02d:%02d.%03ld %4d", data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:1048:9: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (sscanf(line, KEYMAP_NAME "%[^\n]\n", name)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:1055:9: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (sscanf(line, KEYMAP_FORM "%[^\n]\n", form)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:1062:9: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (sscanf(line, KEYMAP_COMM "%[^\n]\n", comment)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:1069:9: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (sscanf(line, KEYMAP_ALIAS "%[^\n]\n", alias)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:1192:7: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. n = vsprintf(translation,value,indexes); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:1313:7: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. n = vsprintf(translation, value, indexes); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:1630:9: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (sscanf(line, CATMAP_NAME "%[^\n]\n", name)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:1637:9: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (sscanf(line, CATMAP_ALIAS "%[^\n]\n", alias)) { data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_imagelist_io.c:496:22: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. cpl_ensure_code( fprintf(stream, msg, himlist->ni) >= msgmin, data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_imagelist_io.c:504:22: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. cpl_ensure_code( fprintf(stream, imsg, i, himlist->ni) >= imsgmin, data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_imagelist_io.c:550:22: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. cpl_ensure_code( fprintf(stream, imsg, i, himlist->ni) >= imsgmin, data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_utils.c:469:16: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (dir && access(dir, W_OK) == 0) { data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_utils.c:474:31: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (tmpdirs[i] && access(tmpdirs[i], W_OK) == 0) { data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/tests/hdrl_frameiter-test.c:377:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (system("rm -f frameiter*fits")) {} data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_bias.c:250:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. (void)snprintf(alldesc,SZ_ALLDESC,vimos_ima_bias_description, data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_bias.c:609:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(outfile[i],esoout[i]); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_bias.c:619:23: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(outfile[i],"%s_%8d.fits",prettypfx[i],night); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_dark.c:275:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. (void)snprintf(alldesc,SZ_ALLDESC,vimos_ima_dark_description, data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_dark.c:736:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(outfile[i],esoout[i]); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_dark.c:746:23: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(outfile[i],"%s_%8d.fits",prettypfx[i],night); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_det_noise.c:182:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. (void)snprintf(alldesc,SZ_ALLDESC,vimos_ima_det_noise_description, data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_fringe.c:224:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. (void)snprintf(alldesc,SZ_ALLDESC,vimos_ima_fringe_description, data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_fringe.c:627:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bname,cpl_frame_get_filename(ps.product_frame_fringe)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_fringe.c:640:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bname,cpl_frame_get_filename(ps.product_frame_fringe_var)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_fringe.c:713:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(fname,F_OK)) data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_fringe.c:808:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(outfname,"%s.fits",esonames[producttype]); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_fringe.c:817:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(outfname,"tmp_%s",bname); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_fringe.c:830:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(outfname,"%s_%s_%s.fits",filter,prefix[producttype],dateobs); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:436:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. (void)snprintf(alldesc,SZ_ALLDESC,vimos_ima_science_description, data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:1167:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(cs.cacheloc,R_OK+W_OK+X_OK) != 0) { data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:1497:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bname, data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:1519:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bname, data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:2011:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(fname,F_OK)) data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:2202:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(bname,F_OK)) data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:2444:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(bname,F_OK)) data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:2597:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(bname,F_OK)) data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:2766:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(outfname,"%s%d.fits",esonames[producttype],fnumber); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:2775:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(outfname,"tmp_%s",bname); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:2784:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(outfname,"%s",bname); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:2786:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(dot,"%s.fits",suffix[producttype]); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:2863:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(tmpfname,"scitmp_%s",cpl_frame_get_filename(fr)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:2864:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(tmpfname,F_OK)) data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:364:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. (void)snprintf(alldesc,SZ_ALLDESC,vimos_ima_standard_description, data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:986:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(cs.cacheloc,R_OK+W_OK+X_OK) != 0) { data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:1289:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bname, data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:1311:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bname, data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:1334:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bname, data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:1356:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bname, data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:1375:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bname, data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:1459:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(fname,F_OK)) data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:1646:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(fname,F_OK)) data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:1802:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(outfname,"%s%d.fits",esonames[producttype],fnumber); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:1811:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(outfname,"tmp_%s",bname); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:1820:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(outfname,"%s",bname); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:1822:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(dot,"%s.fits",suffix[producttype]); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_twilight_flat.c:309:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. (void)snprintf(alldesc,SZ_ALLDESC,vimos_ima_twilight_flat_description, data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_twilight_flat.c:899:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(outfile[i],esoout[i]); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_twilight_flat.c:911:23: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(outfile[i],"%s_%s_%08d.fits",filter,prettypfx[i], data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_science.cc:2748:11: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("rm object_table_*.fits " data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_science.cc:2752:11: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("rm object_table_*.fits " data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_science.cc:2756:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("rm mos_sci_disp_coeff_sky_*.fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_science.cc:2758:13: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("rm mos_sci_skylines_offsets_slit_*.fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmdark.c:1644:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(masterDarkName, mdarkTag)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmdet.c:1508:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(ccdTableName, ccdTableCategory)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmdet.c:1541:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(badPixelImageName, badPixelCategory)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:1723:20: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(traceName, traceTag)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:1860:22: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(idsName, idsTag)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:1951:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(transName, transTag)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2805:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(masterFlatName, mFlatTag)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2854:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(extraName, arcExtrTag)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2882:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(extraName, flatExtrTag)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucombine.c:475:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(fovName, fovFullTag)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucombinecube.cc:706:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(cubeName, cubeTag)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:1031:20: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(outTraceName, outTraceTag)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:1086:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tablename, "ids_1_%s.fits", useSkyIndividual ? "indi" : "norm"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:1111:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tablename, "ids_1x_%s.fits", useSkyIndividual ? "indi" : "norm"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:1116:22: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(outIdsName, outIdsTag)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:1146:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tablename, "ids_2_%s.fits", useSkyIndividual ? "indi" : "norm"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:1670:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(reducedName, reducedTag)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:1699:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(fovName, fovTag)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:1728:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(reducedName, fluxReducedTag)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:1868:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(sphotTableName, sphotTableTag)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:2089:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(reducedName, reducedTag)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:2123:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(fovName, fovTag)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:2154:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(skyName, skyTag)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:2182:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(starName, starTag)); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmspphot.c:668:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(output1DName, "%s_%d.fits", reducedCategory, i); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:10818:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(name, MAX_COLNAME, "%"CPL_SIZE_FORMAT, j); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:10852:21: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(name, MAX_COLNAME, "%"CPL_SIZE_FORMAT, k); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:10863:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(name, MAX_COLNAME, "%"CPL_SIZE_FORMAT, j); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:11253:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(name, MAX_COLNAME, "%"CPL_SIZE_FORMAT, j); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:11289:21: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(name, MAX_COLNAME, "%"CPL_SIZE_FORMAT, k); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:11300:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(name, MAX_COLNAME, "%"CPL_SIZE_FORMAT, j); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_calib_mult.cc:2293:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("rm TMP_mos_arc_spectrum_extracted.fits"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:339:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(filename, category)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:1082:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(filename, category)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:1257:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(filename, category)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:1525:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(filename, tag)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:1565:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(filename, tag)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:1614:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). vmstrlower(strcpy(filename, tag)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_imaging_utils.c:1289:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((*gr)[i].name,cpl_propertylist_get_string(p,"DATE-OBS")); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_pfits.c:156:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chipname,cpl_propertylist_get_string(plist,"ESO DET CHIP1 ID")); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_pfits.c:188:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(filter,cpl_propertylist_get_string(plist,key)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_pfits.c:210:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dateobs,cpl_propertylist_get_string(plist,"DATE-OBS")); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_pfits.c:232:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(projid,cpl_propertylist_get_string(plist,"ESO OBS PROG ID")); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_science_impl.cc:2409:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(name, MAX_COLNAME, "object_%" CPL_SIZE_FORMAT, maxobjects); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_science_impl.cc:2412:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(name, MAX_COLNAME, "object_%" CPL_SIZE_FORMAT, maxobjects); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_science_impl.cc:2419:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(name, MAX_COLNAME, "object_%" CPL_SIZE_FORMAT, j); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_science_impl.cc:2429:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(name, MAX_COLNAME, "ra_%" CPL_SIZE_FORMAT, j); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_science_impl.cc:2436:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(name, MAX_COLNAME, "dec_%" CPL_SIZE_FORMAT, j); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_science_impl.cc:2464:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(name, MAX_COLNAME, "object_%" CPL_SIZE_FORMAT, j); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_science_impl.cc:2466:17: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(name, MAX_COLNAME, "start_%" CPL_SIZE_FORMAT, j); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_science_impl.cc:2468:17: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(name, MAX_COLNAME, "end_%" CPL_SIZE_FORMAT, j); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_science_impl.cc:2491:17: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(name, MAX_COLNAME, "ra_%" CPL_SIZE_FORMAT, j); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_science_impl.cc:2494:17: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(name, MAX_COLNAME, "dec_%" CPL_SIZE_FORMAT, j); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmadf.c:441:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(adf->name, VM_ADF_MOS); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmadf.c:444:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(adf->name, VM_ADF_IFU); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmadf.c:447:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(adf->name, VM_ADF_IMA); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmadf.c:1742:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(adf->name, VM_ADF_MOS); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmadf.c:1745:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(adf->name, VM_ADF_IFU); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmadf.c:1748:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(adf->name, VM_ADF_IMA); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmccdtable.c:123:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(newTab->name, VM_CCD); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmextincttable.c:94:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(table->name, VM_ATMEXT); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmextractiontable.c:162:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(newTab->name, VM_EXT); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmextractiontable.c:1325:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ttype[10+i+1], "%s", colName); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmextractiontable.c:1333:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ttype[11+crvOrder+1+i+1], "%s", colName); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmgrismtable.c:66:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(newTab->name, VM_GRS); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmidstable.c:69:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(newTab->name, VM_IDS); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:6671:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tablename, "align_shifts1_%s.fits", individual ? "indi" : "norm"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:6673:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tablename, "align_ids1_%s.fits", individual ? "indi" : "norm"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifutable.c:228:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ifuTab->name, VM_IFU); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimage.c:2857:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access(imageName, F_OK)) { data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.c:920:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(*pafName, "%s_%d.cmf", namePAF, quad); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.c:935:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(pafName_noext, "%s_%d", namePAF, quad); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.c:1199:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(*pafName, "%s_%d.cmf", namePAF, quad); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.c:1214:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(pafName_noext, "%s_%d", namePAF, quad); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmlinecatalog.c:65:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(newTab->name, VM_LIN); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.c:1706:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(pafName, "%s-%d.paf", namePAF, quad); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.c:1903:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(pafName, "%s-%d.paf", namePAF, quad); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.c:2045:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "%s_%s_%d.cmf", namePAF, grismName, quad); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.c:2049:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(pafName, filename); /* Need this, because pafName is returned */ data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.c:2066:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(pafName_noext, "%s_%s_%d", namePAF, grismName, quad); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmobjecttable.c:125:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(newTab->name, VM_OBJ); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmqcutils.c:991:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(descName, name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmqcutils.c:1064:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(descName, name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmqcutils.c:1142:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(descName, name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmqcutils.c:1226:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(descName, name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmspecphottable.c:99:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(table->name, VM_SPHOT); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmsphottable.c:65:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(newTab->name, VM_SPHOT); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmstarmatchtable.c:107:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(table->name, VM_MATCH); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmstartable.c:100:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(table->name, VM_STAR); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmstdfluxtable.c:95:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(table->name, VM_SFLUX); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:235:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(self->descName, name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:236:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(self->descComment, comment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:251:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(self->descValue->s, value); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:278:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tDesc->descName, name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:279:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tDesc->descComment, comment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:305:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tDesc->descName, name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:306:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tDesc->descComment, comment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:333:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tDesc->descName, name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:334:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tDesc->descComment, comment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:361:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tDesc->descName, name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:362:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tDesc->descComment, comment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:390:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tDesc->descName, name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:391:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tDesc->descComment, comment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:431:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tDesc->descName, name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:432:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tDesc->descComment, comment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:471:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tDesc->descName, name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:472:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tDesc->descComment, comment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:530:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tDesc->descComment, comment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:569:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tDesc->descComment, comment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:607:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tDesc->descComment, comment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:651:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tDesc->descValue->s, value); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:653:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tDesc->descComment, comment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:706:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(copyDesc->descName, outName); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1260:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tCol->colName, name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1285:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tCol->colName, name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1309:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tCol->colName, name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1333:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tCol->colName, name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1358:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tCol->colName, name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1412:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(aNewTable->name, VM_EMPTY_TABLE_STRING); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1535:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(descName, inDesc->descName); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1752:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(comment, desc->descComment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1816:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(comment, desc->descComment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1882:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(comment, desc->descComment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1951:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(comment, desc->descComment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2013:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(val, desc->descValue->s); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2016:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(comment, desc->descComment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2112:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(comment, desc->descComment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2186:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(comment, desc->descComment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2261:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(comment, desc->descComment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:3613:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(charBuf, (tDesc->descValue->s)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:1692:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(cval, FLEN_CARD, PRO_REC_RAWi_NAME, nraw); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:1705:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(cval, FLEN_CARD, PRO_REC_RAWi_CATG, nraw); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:1756:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(cval, FLEN_CARD, PRO_REC_CALi_NAME, ncal); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:1769:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(cval, FLEN_CARD, PRO_REC_CALi_CATG, ncal); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:1782:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(cval, FLEN_CARD, PRO_REC_CALi_DATAMD5, ncal); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:1840:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(cval, FLEN_CARD, PRO_REC_PARAMi_NAME, i + 1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:1855:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(cval, FLEN_CARD, PRO_REC_PARAMi_VALUE, i + 1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwcsutils.c:746:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (wcs->ctype[0], ctype1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwcsutils.c:747:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (wcs->ctype[1], ctype2); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwcsutils.c:862:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (wcs->radecout, wcs->radecsys); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwcsutils.c:865:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (wcs->radecin, wcs->radecsys); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwindowtable.c:186:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(newTab->name, VM_WIN); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c:88:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("ACT_PATH")) != NULL ) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c:357:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("ACT_PATH")) != NULL ) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c:553:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((cdpath = getenv("ACT_PATH")) == NULL ) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:93:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("AGASC_NORTH")) != NULL ) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:95:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("AGASC_SOUTH")) != NULL ) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:405:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("AGASC_NORTH")) != NULL ) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:407:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("AGASC_SOUTH")) != NULL ) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:612:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("PPM_PATH")) != NULL ) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:623:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("SAO_PATH")) != NULL ) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:633:27: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!binset && (str = getenv("WCS_BINDIR")) != NULL ) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:568:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("WCS_CATDIR")) != NULL ) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:651:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("WCS_CATDIR")) != NULL ) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:95:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("GSC_PATH")) != NULL) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:117:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("GSC_NORTH")) != NULL ) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:119:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("GSC_SOUTH")) != NULL ) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:420:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("GSC_PATH")) != NULL) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:440:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("GSC_NORTH")) != NULL ) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:442:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("GSC_SOUTH")) != NULL ) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:94:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("TY2_PATH")) != NULL ) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:363:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("TY2_PATH")) != NULL ) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:513:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("TY2_PATH")) != NULL ) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:582:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("TY2_PATH")) != NULL ) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:759:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("TY2_PATH")) != NULL ) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:198:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("USA2_PATH")) != NULL) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:204:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("USA1_PATH")) != NULL) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:213:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("UA2_PATH")) != NULL) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:215:22: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. else if ((str = getenv("UA2_ROOT")) != NULL) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:223:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("UA1_PATH")) != NULL) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:225:22: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. else if ((str = getenv("UA1_ROOT")) != NULL) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:527:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("USA2_PATH")) != NULL) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:533:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("USA1_PATH")) != NULL) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:542:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("UA2_PATH")) != NULL) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:544:22: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. else if ((str = getenv("UA2_ROOT")) != NULL) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:552:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("UA1_PATH")) != NULL) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:554:22: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. else if ((str = getenv("UA1_ROOT")) != NULL) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ujcread.c:105:33: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (refcat == UJC && (str = getenv("UJ_PATH")) != NULL ) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ujcread.c:365:33: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (refcat == UJC && (str = getenv("UJ_PATH")) != NULL ) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:2417:18: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. else if ((str = getenv (envar)) != NULL) data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_plugin.c:552:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("CPL_MSG_LEVEL") == NULL) cpl_msg_set_level(CPL_MSG_OFF); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_plugin.c:650:27: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. svalue = envvar ? getenv(envvar) : NULL; data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_plugin.c:857:46: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char * sof_path = envname ? getenv(envname) : NULL; data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_plugin.c:898:29: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char * sof_path = getenv(var_name); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.c:211:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. #ifndef getenv data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.c:212:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. extern char *getenv (); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.c:397:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. posixly_correct = getenv ("POSIXLY_CORRECT"); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.c:972:1: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. getopt (argc, argv, optstring) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.c:1002:11: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. c = getopt (argc, argv, "abc:d:0123456789"); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.h:145:12: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. extern int getopt (int __argc, char *const *__argv, const char *__shortopts); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.h:147:12: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. extern int getopt (); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.h:151:12: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. extern int getopt_long (int __argc, char *const *__argv, const char *__shortopts, data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.h:164:12: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. extern int getopt (); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.h:166:12: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. extern int getopt_long (); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt1.c:67:1: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. getopt_long (argc, argv, options, long_options, opt_index) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt1.c:123:11: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. c = getopt_long (argc, argv, "abc:d:0123456789", data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:104:25: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. register char *path = getenv(env); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:192:32: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!instrument || !(troot = getenv(PIL_ROOTDIR))) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:249:15: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((path = getenv("HOME")) == NULL) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:356:27: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. register char *tvalue = getenv(PIL_EXPORT_FLAG); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:402:27: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. register char *tvalue = getenv(PIL_OVERWRITE_FLAG); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:2379:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. user = getenv("USER"); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:2380:27: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. user = user == NULL ? getenv("LOGNAME") : user; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1575:15: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, common_optstr, options, data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_buffer.c:283:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. getenv("HDRL_BUFFER_MALLOC")) { data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_utils.c:460:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. getenv("TMPDIR"), data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:202:5: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned int)time((time_t *)0)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:15314:51: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *saturation_level = getenv("SATURATION_LEVEL"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:15316:48: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *max_saturated = getenv("MAX_SATURATED"); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_backmap.c:175:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. memset((char *)hist[i],0,MAXHIST*sizeof(int)); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_defringe.c:121:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pname1[64],comment1[64],pname2[64],comment2[64]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_defringe.c:153:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf(pname1,"ESO DRS FRINGE%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_defringe.c:154:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf(comment1,"Fringe frame # %d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_defringe.c:155:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf(pname2,"ESO DRS FRNGSC%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_defringe.c:156:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf(comment2,"Fringe scale # %d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_fits.c:85:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char extname[81]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_fits.c:144:27: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf(extname,"%d",nexten); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_fits.c:158:27: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf(extname,"%d",nexten); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_fits.c:167:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf(extname,"%d",nexten); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:168:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *req_string,catname2[64],*cdscatname,*cdscatid,*path2; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:382:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *cdscats[7] = {"","II/246","I/284","I/317","II/183A","II/311", data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:384:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *cdscatnames[7] = {"","2mass","usnob","ppmxl","landolt","wise", data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:443:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullname[SZBUF]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:635:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullname[SZBUF]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:827:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullname[SZBUF]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1117:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fname[BUFSIZ],catname2[SZBUF]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1125:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = fopen(fname,"r"); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1221:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newname[SZBUF]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1234:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = fopen(newname,"a"); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1287:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFMAX],outfile[32]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1324:10: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). fd = mkstemp(outfile); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1397:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFMAX]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1449:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ssin.sin_addr,hp->h_addr_list[0],hp->h_length); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1505:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[2*BUFSIZ]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1506:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[BUFSIZ],equi[1]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1576:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[BUFSIZ]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1598:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf+j,"%%%2x",(unsigned char)instring[i]); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_imcombine.c:173:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[SZBUF]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_imdither.c:165:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timestamp[25]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_nditcor.c:90:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[32]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_nditcor.c:118:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf(comment,"Corrected for ndit=%d",ndit); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_nditcor.c:129:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf(comment,"Corrected for ndit=%d",ndit); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_photcal_extinct.c:873:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *req_cols[9] = {"filter_name","atm_extcoef","mag_offset", data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_photcal_extinct.c:997:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *cols[2] = {"coleq_columns","coleq_errcols"}; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_platesol.c:142:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[9]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_utils.c:290:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[SZKEY],value[SZVAL],*fn,*base; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_utils.c:1095:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char test[8]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_utils.c:1102:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). info[i] = atoi(test); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_wcsutils.c:46:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *notabkeys[NNOTABKEYS] = {"^CRVAL[1-2]*","^CRPIX[1-2]*", data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_wcsutils.c:467:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[SZKEY]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_wcsutils.c:557:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[SZKEY]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_wcsutils.c:763:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[9],key2[9]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/classify.c:91:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *cols32[NCOL32] = {"Core_flux","Core1_flux","Core2_flux", data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/classify.c:98:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *cols80[NCOL80] = {"Aper_flux_3","Aper_flux_1","Aper_flux_4", data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/classify.c:206:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *cols[MAX(NCOL32,NCOL80)],colname[32]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/classify.c:235:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cols[i] = (char *)cols32[i]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/classify.c:239:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cols[i] = (char *)cols80[i]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/classify.c:243:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cols[i] = (char *)cols80[i]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/classify.c:305:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(colname,"Areal_%d_profile",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table.c:335:49: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern int imcore_do_seeing_gen(ap_t *ap, const char *col_ellipt, data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table.c:336:32: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *col_pkht, char *col_areals[NAREAL], data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table.c:336:48: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *col_pkht, char *col_areals[NAREAL], data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_1.c:79:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *ttype[NCOLS]={"No.","Isophotal_flux","Total_flux","Core_flux", data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_1.c:89:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *tunit[NCOLS]={" ","Counts","Counts","Counts","Pixels","Pixels", data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_1.c:178:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *areal_colnames[NAREAL]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_1.c:183:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. areal_colnames[i] = (char *)ttype[areal_cols[i]-1]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_2.c:102:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *ttype[NCOLS]={"Sequence_number","Isophotal_flux", data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_2.c:134:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *tunit[NCOLS]={"Number","ADU", data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_2.c:278:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *areal_colnames[NAREAL]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_2.c:283:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. areal_colnames[i] = (char *)ttype[areal_cols[i]-1]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_3.c:59:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *ttype[NCOLS]={"No.","X_coordinate","Y_coordinate", data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_3.c:69:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *tunit[NCOLS]={" ","Pixels","Pixels","Counts","Counts"," ", data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_3.c:158:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *areal_colnames[NAREAL]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_3.c:163:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. areal_colnames[i] = (char *)ttype[areal_cols[i]-1]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_6.c:102:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *ttype[NCOLS]={"Sequence_number","Isophotal_flux", data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_6.c:134:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *tunit[NCOLS]={"Number","ADU", data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_6.c:280:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *areal_colnames[NAREAL]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/create_table_6.c:285:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. areal_colnames[i] = (char *)ttype[areal_cols[i]-1]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/imcore_background.c:146:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. memset((char *)hist[i],0,MAXHIST*sizeof(int)); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/catalogue/imcore_conf.c:159:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char card[64]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_fits-test.c:46:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[BUFSIZ]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/tests/casu_tfits-test.c:46:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[BUFSIZ]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c:17:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char actcd[64]="/data/act"; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c:77:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c:577:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(fcat = fopen (path, "r"))) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c:636:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rastr[16], raxstr[16], ramins[16], ramaxs[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c:728:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c:764:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). irh = atoi (line); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c:765:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). irm = atoi (line+3); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c:768:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). idd = atoi (line+15); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c:769:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). idm = atoi (line+18); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c:804:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((diskfile = fopen (filename, "r")) == NULL) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:15:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdn[64]="/data/gsc1"; /* pathname of northern hemisphere AGASC CDROM */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:16:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cds[64]="/data/gsc2"; /* pathname of southern hemisphere AGASC CDROM */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:59:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inpath[64]; /* Pathname for input FITS table file */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:60:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entry[100]; /* Buffer for FITS table row */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:78:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:137:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[0].kname,"AGASC_ID"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:138:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[1].kname,"RA_DEG"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:139:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[2].kname,"DEC_DEG"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:140:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[3].kname,"POS_ERR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:141:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[4].kname,"MAG"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:142:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[5].kname,"MAG_ERR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:143:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[6].kname,"MAG_BAND"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:144:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[7].kname,"CLASS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:379:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inpath[64]; /* Pathname for input FITS table file */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:380:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entry[100]; /* Buffer for FITS table row */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:412:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[0].kname,"AGASC_ID"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:413:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[1].kname,"RA_DEG"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:414:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[2].kname,"DEC_DEG"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:415:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[3].kname,"POS_ERR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:416:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[4].kname,"MAG"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:417:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[5].kname,"MAG_ERR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:418:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[6].kname,"MAG_BAND"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:419:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[7].kname,"CLASS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:571:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zdir[24][8]={"n0000","n0730","n1500","n2230","n3000","n3730","n4500", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:596:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tabpath[64]; /* Pathname for regions table */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:605:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fitsline[120]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:614:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[0].kname,"REG_NO"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:615:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[1].kname,"RA_H_LOW"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:616:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[2].kname,"RA_M_LOW"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:617:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[3].kname,"RA_S_LOW"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:618:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[4].kname,"RA_H_HI"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:619:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[5].kname,"RA_M_HI"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:620:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[6].kname,"RA_S_HI"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:621:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[7].kname,"DECSI_LOW"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:622:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[8].kname,"DEC_D_LOW"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:623:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[9].kname,"DEC_M_LOW"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:624:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[10].kname,"DECSI_HI"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:625:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[11].kname,"DEC_D_HI"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:626:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[12].kname,"DEC_M_HI"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:637:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (tabpath,"/tables/regions.tbl"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:646:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (tabpath,"/tables/regions.tbl"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/agascread.c:825:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sgn[4]; /* Sign of declination */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:17:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bindir[64]="/data/stars"; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:98:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstr[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:99:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[128]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:192:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rstr1[16],rstr2[16],dstr1[16],dstr2[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:452:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[128]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:600:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char binpath[128]; /* Full pathname for catalog file */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:669:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fcat = open (binpath, O_RDONLY)) < 3) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:801:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rastr[16], raxstr[16], ramins[16], ramaxs[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:938:6: [2] (buffer) bcopy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. bcopy ((char *)&st->xno, (char *) &ino, 4); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:942:6: [2] (buffer) bcopy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. bcopy ((char *)&st->xno, (char *) &ino, 4); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:946:6: [2] (buffer) bcopy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. bcopy ((char *)&st->xno, (char *) &ino, 4); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:1052:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[8]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:1085:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((diskfile = fopen (filename, "r")) == NULL) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:1111:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[8]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:1114:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((diskfile = fopen (filename, "r")) == NULL) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:24:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char catdir[64]="/data/catalogs"; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:76:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:375:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:541:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[80]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:542:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char catpath[128]; /* Full pathname for catalog file */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:547:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[80]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:586:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(fcat = fopen (catpath, "r"))) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:782:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[80]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:988:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((diskfile = fopen (filename, "r")) == NULL) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:1055:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). deg = (double) atoi (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:1060:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). min = (double) atoi (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:1070:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). min = (double) atoi (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:1088:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dec = sign * (double) atoi (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:85:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (title, "HST Guide Stars"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:99:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (title, "USNO SA-1.0 Catalog Stars"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:103:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (title, "USNO SA-2.0 Catalog Stars"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:107:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (title, "USNO SA Catalog Stars"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:126:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (title, "USNO A-1.0 Catalog Stars"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:130:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (title, "USNO A-2.0 Catalog Stars"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:134:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (title, "USNO A Catalog Stars"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:140:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (title, "USNO J Catalog Stars"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:149:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (title, "SAO Catalog Stars"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:164:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (title, "PPM Catalog Stars"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:179:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (title, "IRAS Point Sources"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:192:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (title, "Tycho 2 Catalog Stars"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:200:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (title, "Tycho Catalog Stars"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:213:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (title, "Hipparcos Catalog Stars"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:225:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (title, "ACT Catalog Stars"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:234:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (title, "Bright Star Catalog Stars"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:254:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (title, " Catalog Sources"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:266:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (title, " Catalog Sources"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:278:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (title, " Catalog Sources"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:304:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (catname, "GSC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:306:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (catname, "UJC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:308:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (catname, "UA2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:310:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (catname, "USA2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:312:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (catname, "SAO"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:314:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (catname, "IRAS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:316:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (catname, "PPM"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:318:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (catname, "TYCHO"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:320:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (catname, "UA1"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:322:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (catname, "UA2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:324:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (catname, "USA1"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:326:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (catname, "USA2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:328:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (catname, "HIP"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:330:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (catname, "ACT"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:332:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (catname, "BSC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:334:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (catname, "TY2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:374:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (refcatname, "gsc"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:378:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (refcatname, "uac"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:382:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (refcatname, "ua1"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:386:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (refcatname, "ua2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:390:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (refcatname, "usac"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:394:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (refcatname, "usa1"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:398:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (refcatname, "usa2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:402:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (refcatname, "ujc"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:406:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (refcatname, "sao"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:410:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (refcatname, "ppm"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:414:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (refcatname, "iras"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:419:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (refcatname, "tycho2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:421:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (refcatname, "tycho"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:425:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (refcatname, "hipparcos"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:429:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (refcatname, "act"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:433:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (refcatname, "bsc"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:450:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nform[16]; /* Format for star number */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:456:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (numstr, "%013.8f", dnum); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:458:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (numstr, "%13.8f", dnum); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:464:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (numstr, "%07d", (int)(dnum+0.5)); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:466:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (numstr, "%7d", (int)(dnum+0.5)); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:472:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (numstr, "%012.7f", dnum); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:474:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (numstr, "%12.7f", dnum); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:480:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (numstr, "%09.4f", dnum); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:482:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (numstr, "%9.4f", dnum); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:488:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (numstr, "%06d", (int)(dnum+0.5)); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:490:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (numstr, "%6d", (int)(dnum+0.5)); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:496:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (numstr, "%010.5f", dnum); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:498:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (numstr, "%10.5f", dnum); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:504:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (nform,"%%%d.%df", nnfld, nndec); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:506:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (nform,"%%0%d.%df", -nnfld, nndec); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:508:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (nform,"%%%d.%df", nndec+5, nndec); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:512:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (nform,"%%%d.0f", nnfld); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:516:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (nform,"%%%dd", nnfld); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:520:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (nform,"%%0%dd", -nnfld); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:524:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (numstr, "%6d", (int)(dnum+0.49)); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:715:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rstr1[16],rstr2[16],dstr1[16],dstr2[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:809:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rstr1[16],rstr2[16],dstr1[16],dstr2[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1294:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char skey[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1295:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[81]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1297:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char squot[2], dquot[2], lbracket[2], rbracket[2], comma[2]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1335:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (skey, " ="); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1344:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (skey, ": "); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1364:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ipar = atoi (brack1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1393:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sptbv[468]={"O5O8B0B0B0B1B1B1B2B2B2B3B3B3B4B5B5B6B6B6B7B7B8B8B8B9B9B9B9A0A0A0A0A0A0A0A0A0A2A2A2A2A2A2A2A2A5A5A5A5A6A7A7A7A7A7A7A7A7A7A7F0F0F0F0F0F0F0F2F2F2F2F2F2F2F5F5F5F5F5F5F5F5F5F8F8F8F8F8F8G0G5G5G2G2G2G3G3G4G4G5G5G5G6G6G6G6G6K6K6K6K6K7K7K7K7K7K7K7K7K7K7K7K7K7K7K8K8K8K8K8K8K8K8K8K8K8K8K8K8K8K8K8K8K8K5K5K5K5K5K6K6K6K6K6K6K6K7K7K7K7K7K7K7K8K8K8K8K9K9K9M0M0M0M0M0M0M1M1M1M1M1M2M2M2M2M3M3M4M4M5M5M5M2M2M2M3M3M4M4M5M5M5M6M6M6M6M6M6M6M6M6M7M7M7M7M7M7M7M7M7M7M7M7M7M7M8M8M8M8M8M8M8"}; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1432:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sptbr1[96]={"O5O8O9O9B0B0B0B0B0B1B1B1B2B2B2B2B2B3B3B3B3B3B3B5B5B5B5B6B6B6B7B7B7B7B8B8B8B8B8B9B9B9B9B9A0A0A0"}; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1434:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sptbr2[904]={"A0A0A0A0A0A0A0A0A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2A5A5A5A5A5A5A5A5A5A5A5A7A7A7A7A7A7A7A7A7A7A7A7A7A7A7A7F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F0F2F2F2F2F2F2F2F2F2F2F2F5F5F5F5F5F5F5F5F5F5F5F5F5F5F8F8F8F8F8F8F8F8F8F8F8F8F8F8G0G0G0G0G0G0G0G0G2G2G2G2G2G5G5G5G5G5G5G5G5G8G8G8G8G8G8G8G8G8G8G8G8G8G8K0K0K0K0K0K0K0K0K0K0K0K0K0K0K0K2K2K2K2K2K2K2K2K2K2K2K2K2K2K2K2K2K2K2K2K2K2K2K2K2K2K2K2K2K2K2K2K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K5K7K7K7K7K7K7K7K7K7K7K7K7K7K7K7K7K7K7K7K7K7K7K7K7K7M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M1M1M1M1M1M1M1M1M1M1M1M1M1M1M1M2M2M2M2M2M2M2M2M2M2M2M2M2M2M2M3M3M3M3M3M3M3M3M3M3M3M4M4M4M4M4M4M4M4M4M4M4M4M4M4M5M5M5M5M5M5M5M5M5M5M5M5M5M5M5M5M5M5M5M5M6M6M6M6M6M6M6M6M6M6M6M6M6M6M6M6M6M6M6M6M6M6M6M6M6M6M6M6M6M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M7M8M8M8M8M8M8M8M8M8M8M8M8M8M8M8M8M8M8M8M8M8M8M8M8"}; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/cel.c:260:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pcodes[25][4] = data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/cel.c:268:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char pcode[4]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/cel.c:517:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char pcode[4]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/cel.c:546:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char pcode[4]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:27:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char catdir[64]="/data/catalogs"; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:80:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:438:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:623:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[80]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:624:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char catpath[128]; /* Full pathname for catalog file */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:630:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[80]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:670:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(fcat = fopen (catpath, "r"))) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:937:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[80]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:1188:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((diskfile = fopen (filename, "r")) == NULL) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:1214:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:1219:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(fcat = fopen (catpath, "r"))) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:1280:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). deg = (double) atoi (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:1285:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). min = (double) atoi (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:1295:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). min = (double) atoi (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:1313:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dec = sign * (double) atoi (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/daoread.c:119:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(fcat = fopen (daofile, "r"))) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:207:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tstring[32], dstring[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:208:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outform[64]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:222:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (outform, "%%02d:%%02d:%%0%d.%df", nf, ndec); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:226:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (outform, "%%02d:%%02d:%%0%dd", nf); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:233:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (dstring, "%4d-%02d-%02d", iyr, imon, iday); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:458:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (isotime, "%04d-%02d-%02dT%02d:%02d:%02d", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:1302:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (string, "*** date out of range ***"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:1304:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (string, "%02d/%02d/%02d %02d:%02d:%06.3f", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:1307:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (string, "%02d/%02d/%3d %02d:%02d:%6.3f", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:1310:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (string, "*** date out of range ***"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:1335:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (string, "*** date out of range ***"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:1337:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (string, "%02d/%02d/%02d", iday, imon, iyr-1900); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:1339:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (string, "%02d/%02d/%3d", iday, imon, iyr-1900); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:1341:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (string, "*** date out of range ***"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:1365:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (string, "%02d:%02d:%06.3f", ihr, imn, sec); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/dateutil.c:2073:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (isotime, "%04d-%02d-%02dT%02d:%02d:%02d", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fileutil.c:82:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((diskfile = fopen (filename, "r")) == NULL) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fileutil.c:131:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((diskfile = fopen (filename, "r")) == NULL) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fileutil.c:156:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[256]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fileutil.c:159:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((diskfile = fopen (filename, "r")) == NULL) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/findstar.c:28:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char imcatname[256] = ""; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/findstar.c:128:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trimsec[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/findstar.c:163:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). xborder1 = atoi (tx1+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/findstar.c:166:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). xborder2 = w - atoi (tx2); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/findstar.c:169:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). yborder1 = atoi (tx3); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/findstar.c:172:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). yborder2 = atoi (tx4) - h; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/findstar.c:761:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). setnspix (atoi (parvalue)); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/findstar.c:764:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). setispix (atoi (parvalue)); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/findstar.c:767:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). setniterate (atoi (parvalue)); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/findstar.c:769:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). setborder (atoi (parvalue)); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/findstar.c:771:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). setmaxrad (atoi (parvalue)); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/findstar.c:773:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). setminrad (atoi (parvalue)); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/findstar.c:777:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). setmaxwalk (atoi (parvalue)); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/findstar.c:779:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). setminsep (atoi (parvalue)); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:81:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fitsbuf[2884]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:87:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char extname[32]; /* FITS extension name */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:88:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char extnam[32]; /* Desired FITS extension name */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:128:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). extnum = atoi (ext+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:524:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open (inpath, O_RDONLY); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:564:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:618:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tname[12]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:619:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:620:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tform[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:663:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (tname, "TBCOL%d", ifield+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:670:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (tname, "TFORM%d", ifield+1);; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:677:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). pw[ifield].kl = atoi (tf1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:681:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (tname, "TTYPE%d", ifield+1);; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:802:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[30]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:819:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[30]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:836:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[30]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:853:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[30]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:904:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open (filename, O_WRONLY); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:911:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open (filename, O_RDWR+O_CREAT, 0666); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:943:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open (filename, O_WRONLY); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:951:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open (filename, O_APPEND, 0666); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:1181:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdout = open (filename, O_WRONLY); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:1188:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdout = open (filename, O_RDWR+O_CREAT, 0666); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:1267:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open (filename, O_WRONLY); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:1274:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open (filename, O_RDWR+O_CREAT, 0666); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:1312:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:1327:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((diskfile = fopen (filename, "r")) == NULL) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.h:15:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kname[10]; /* Keyword for table entry */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:108:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char flds[15][8]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:112:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rastr[16],decstr[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:114:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[0], "CTYPE1"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:115:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[1], "CTYPE2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:116:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[2], "CRVAL1"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:117:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[3], "CRVAL2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:118:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[4], "CDELT1"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:119:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[5], "CDELT2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:120:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[6], "CRPIX1"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:121:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[7], "CRPIX2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:122:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[8], "CROTA1"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:123:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[9], "CROTA2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:124:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[10], "IMWCS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:125:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[11], "CD1_1"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:126:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[12], "CD1_2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:127:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[13], "CD2_1"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:128:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[14], "CD2_2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:204:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:207:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CO1_%d", i); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:214:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CO2_%d", i); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:225:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:228:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"PC%03d%03d", i, j); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:253:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[80]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:256:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:294:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CO1_%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:304:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CO2_%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:353:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char vimoswcsproj[8]="TAN"; /* WCS projection name */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:370:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char wcstemp[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:403:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (wcstemp, "RA---"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:406:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (wcstemp, "DEC--"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:457:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:460:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword, "CO1_%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:465:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsvimoswcs.c:468:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword, "CO2_%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fortcat.c:32:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char catdir[64]="/data/catalogs"; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fortcat.c:69:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[64]; /* Title of catalog */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fortcat.c:120:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[64]; /* Title of catalog */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:16:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdn[64]="/data/gsc1"; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:19:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cds[64]="/data/gsc2"; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:66:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inpath[64]; /* Pathname for input FITS table file */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:67:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entry[100]; /* Buffer for FITS table row */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:85:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:160:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[0].kname,"GSC_ID"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:161:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[1].kname,"RA_DEG"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:162:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[2].kname,"DEC_DEG"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:163:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[3].kname,"POS_ERR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:164:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[4].kname,"MAG"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:165:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[5].kname,"MAG_ERR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:166:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[6].kname,"MAG_BAND"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:167:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[7].kname,"CLASS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:400:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inpath[64]; /* Pathname for input FITS table file */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:401:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entry[100]; /* Buffer for FITS table row */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:447:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[0].kname,"GSC_ID"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:448:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[1].kname,"RA_DEG"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:449:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[2].kname,"DEC_DEG"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:450:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[3].kname,"POS_ERR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:451:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[4].kname,"MAG"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:452:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[5].kname,"MAG_ERR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:453:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[6].kname,"MAG_BAND"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:454:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (kw[7].kname,"CLASS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:605:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zdir[24][8]={"n0000","n0730","n1500","n2230","n3000","n3730","n4500", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:630:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tabpath[64]; /* Pathname for regions table */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:639:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fitsline[120]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:648:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[0].kname,"REG_NO"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:649:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[1].kname,"RA_H_LOW"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:650:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[2].kname,"RA_M_LOW"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:651:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[3].kname,"RA_S_LOW"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:652:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[4].kname,"RA_H_HI"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:653:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[5].kname,"RA_M_HI"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:654:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[6].kname,"RA_S_HI"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:655:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[7].kname,"DECSI_LOW"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:656:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[8].kname,"DEC_D_LOW"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:657:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[9].kname,"DEC_M_LOW"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:658:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[10].kname,"DECSI_HI"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:659:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[11].kname,"DEC_D_HI"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:660:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (rkw[12].kname,"DEC_M_HI"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:671:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (tabpath,"/tables/regions.tbl"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:680:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (tabpath,"/tables/regions.tbl"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/gscread.c:859:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sgn[4]; /* Sign of declination */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:58:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char val[VLENGTH+1]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:542:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keywordi[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:544:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyform[8]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:551:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (keyform, "%s_%d"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:555:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (keyform, "%s_%02d"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:559:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (keyform, "%s_%03d"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:684:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cval[80]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:686:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwhite[2]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:687:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char squot[2], dquot[2], lbracket[2], rbracket[2], slash[2], comma[2]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:688:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[81]; /* large for ESO hierarchical keywords */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:689:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[100]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:819:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ipar = atoi (brack1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:1106:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). deg = (double) atoi (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:1113:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). min = (double) atoi (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:1123:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). min = (double) atoi (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:1130:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dec = sign * (double) atoi (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:63:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[30]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:66:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (value,"%d",ival); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:83:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[30]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:86:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (value,"%d",ival); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:102:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[30]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:105:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (value,"%f",rval); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:121:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[30]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:124:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (value,"%g",dval); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:141:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[30]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:142:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format[8]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:147:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (format, "%%.%dg", -ndec); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:153:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (format, "%%.%df", ndec); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:171:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[30]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:190:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[30]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:210:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[8]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:236:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyroot[8], newkey[12], *v, value[80]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:312:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[80]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:359:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[100]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:360:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newcom[50]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:529:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[100]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:750:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tstring[64]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:791:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf (tstring,"%02d:%02d:%09.6f",hours,minutes,seconds); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:803:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf (tstring,"%02d:%02d:%08.5f",hours,minutes,seconds); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:815:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf (tstring,"%02d:%02d:%07.4f",hours,minutes,seconds); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:827:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf (tstring,"%02d:%02d:%06.3f",hours,minutes,seconds); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:839:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf (tstring,"%02d:%02d:%05.2f",hours,minutes,seconds); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:851:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf (tstring,"%02d:%02d:%04.1f",hours,minutes,seconds); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:863:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf (tstring,"%02d:%02d:%04.1f",hours,minutes,seconds); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:894:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tstring[64]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:939:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf (tstring,"%c%02d:%02d:%09.6f",sign,degrees,minutes,seconds); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:950:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf (tstring,"%c%02d:%02d:%08.5f",sign,degrees,minutes,seconds); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:961:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf (tstring,"%c%02d:%02d:%07.4f",sign,degrees,minutes,seconds); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:972:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf (tstring,"%c%02d:%02d:%06.3f",sign,degrees,minutes,seconds); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:983:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf (tstring,"%c%02d:%02d:%05.2f",sign,degrees,minutes,seconds); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:994:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf (tstring,"%c%02d:%02d:%04.1f",sign,degrees,minutes,seconds); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1005:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf (tstring,"%c%02d:%02d:%04.1f",sign,degrees,minutes,seconds); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1030:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char degform[8]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1032:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tstring[64]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1052:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (degform, "%%%d.%df", field, ndec); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1056:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (degform, "%%%4d", field); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1082:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char numform[8]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1086:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (numform, "%%%d.%df", field, ndec); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1090:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (numform, "%%%dd", field); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1096:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (numform, "%%.%df", ndec); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1100:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (string, "%d", (int)num); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c:40:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char val[30]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c:276:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *value,val[30]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c:342:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cval[500]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c:344:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwhite[8]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c:345:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lbracket[2],rbracket[2]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c:346:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c:347:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[500]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c:394:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ipar = atoi (c1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:39:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ctypes[28][4]; /* 3-letter codes for projections */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:67:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rstr[64], dstr[64], temp[16], cstr[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:125:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (temp,"RA---"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:128:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (temp,"DEC--"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:437:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[0], "DSS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:438:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[1], "AZP"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:439:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[2], "TAN"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:440:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[3], "SIN"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:441:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[4], "STG"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:442:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[5], "ARC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:443:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[6], "ZPN"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:444:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[7], "ZEA"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:445:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[8], "AIR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:446:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[9], "CYP"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:447:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[10], "CAR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:448:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[11], "MER"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:449:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[12], "CEA"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:450:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[13], "COP"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:451:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[14], "COD"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:452:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[15], "COE"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:453:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[16], "COO"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:454:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[17], "BON"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:455:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[18], "PCO"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:456:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[19], "GLS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:457:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[20], "PAR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:458:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[21], "AIT"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:459:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[22], "MOL"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:460:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[23], "CSC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:461:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[24], "QSC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:462:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[25], "TSC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:463:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[26], "NCP"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imgetvimoswcs.c:464:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[27], "TNX"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:176:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = fopen (filename, "r"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:247:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pixname[SZ_IM2PIXFILE+1]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:248:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newpixname[SZ_IM2HDRFILE+1]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:256:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = fopen (bang + 1, "r"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:258:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = fopen (pixname, "r"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:267:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = fopen (newpixname, "r"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:437:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *fhead, *fhead1, *fp, endline[81]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:439:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fitsline[81]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:595:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (fitsline, "IRAF header file name"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:627:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (fitsline, "IRAF .pix pixel file"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:813:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open (hdrname, O_WRONLY); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:820:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open (hdrname, O_RDWR+O_CREAT, 0666); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:857:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pixname[SZ_IM2PIXFILE+1]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:909:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open (pixname, O_WRONLY); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:916:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open (pixname, O_RDWR+O_CREAT, 0666); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:1022:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *fitsend, *fitsp, pixfile[SZ_IM2PIXFILE], hdrfile[SZ_IM2HDRFILE]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:1023:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[SZ_IM2TITLE], temp[80]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:1139:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (temp, "HDR$"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:1145:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (temp, "HDR$"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:1165:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (temp, "HDR$"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:1675:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[8]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imio.c:865:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[8]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char history[128]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:251:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char flds[15][8]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:252:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctype1[16], ctype2[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:256:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[0], "CTYPE1"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:257:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[1], "CTYPE2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:258:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[2], "CRVAL1"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:259:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[3], "CRVAL2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:260:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[4], "CDELT1"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:261:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[5], "CDELT2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:262:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[6], "CRPIX1"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:263:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[7], "CRPIX2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:264:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[8], "CROTA1"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:265:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[9], "CROTA2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:266:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[10], "IMWCS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:267:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[11], "CD1_1"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:268:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[12], "CD1_2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:269:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[13], "CD2_1"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:270:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (flds[14], "CD2_2"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:502:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:505:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CO1_%d", i); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imrotate.c:509:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CO2_%d", i); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imsetvimoswcs.c:53:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char defcatname[8]; /* default catalog name */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imsetvimoswcs.c:66:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char matchcat[32]=""; /* Match catalog name */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imsetvimoswcs.c:118:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char numstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imsetvimoswcs.c:127:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rstr[32], dstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imsetvimoswcs.c:132:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char refcoor[8]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imsetvimoswcs.c:133:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[80]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imsetvimoswcs.c:451:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rastr[32], decstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imsetvimoswcs.c:761:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rstr[32], dstr[32], numstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:32:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outname[128]; /* Name for output image */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:67:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rastr[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:68:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char decstr[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:71:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[128]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:299:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((flist = fopen (listfile, "r")) == NULL) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:383:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newname[128]; /* Name for revised image */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:384:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pixname[128]; /* Pixel file name for revised image */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:385:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:514:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (temp,"%1d",rot); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:516:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (temp,"%2d",rot); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:518:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (temp,"%3d",rot); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:520:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (temp,"%4d",rot); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:526:6: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (newname, "w.fits"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:528:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (pixname, "HDR$"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:530:6: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (pixname, "w.pix"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:532:6: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (newname, "w.imh"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/matchstar.c:97:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rastr[16], decstr[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/matchstar.c:101:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpar[16]; /* List of parameters to fit */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/matchstar.c:278:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (vpar, "%d", pfit); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/matchstar.c:346:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vimoswcstring[64]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/matchstar.c:462:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rastr[32], decstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/matchstar.c:470:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[1025]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/matchstar.c:475:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[256]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/matchstar.c:486:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(fd = fopen (filename, "r"))) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/matchstar.c:687:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rastr[16], decstr[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/matchstar.c:691:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpar[16]; /* List of parameters to fit */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/matchstar.c:788:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (vpar, "%d", pfit); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/matchstar.c:856:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vimoswcstring[64]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/matchstar.c:975:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rastr[16],decstr[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/matchstar.c:1227:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rastr[16], decstr[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/matchstar.c:1268:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rastr[16],decstr[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/platefit.c:198:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rastr[16], decstr[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/platepos.c:343:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/platepos.c:347:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CO1_%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/platepos.c:351:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CO2_%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/polyfit.c:196:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rastr[16], decstr[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:103:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:386:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:654:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[TABMAX]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:724:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:760:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keyid, "ID"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:762:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keyid, "id"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:781:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keyra, "RA"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:783:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keyra, "ra"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:785:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keyra, "ra"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:795:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keydec, "DEC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:797:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keydec, "dec"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:799:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keydec, "dec"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:809:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keymag1, "MAG"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:811:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keymag1, "MAG"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:813:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keymag1, "MAG"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:815:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keymag1, "magr"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:825:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keymag2, "magb"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:827:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keymag2, "magr"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:833:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keyrpm, "URA"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:835:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keyrpm, "ura"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:837:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keyrpm, "Ura"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:839:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keyrpm, "Ux"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:845:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keydpm, "UDEC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:847:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keydpm, "udec"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:849:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keydpm, "Udec"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:851:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keydpm, "Uy"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:926:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keypeak, "PEAK"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:928:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keypeak, "peak"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:930:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keypeak, "plate"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:934:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keypeak, "field"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:942:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keytype, "TYPE"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:944:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (sc->keytype, "type"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1039:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (cstr,"%.0f", (dnum * 100000000.0) + 0.1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1088:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cnum[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1112:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (cnum,"%.0f", (st->num * 100000000.0) + 0.1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1260:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(fcat = fopen (tabfile, "r"))) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1318:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). itab = atoi (tabname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1493:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[24]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1511:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[24]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1528:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[24]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1545:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[24]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1563:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[24]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1641:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[24]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1661:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[24]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1681:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *str0, *str1, *line, *head, keylow[24], keyup[24]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1857:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((diskfile = fopen (filename, "r")) == NULL) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tnxfit.c:180:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rastr[16], decstr[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:20:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ty2cd[64]="/data/catalogs/tycho2"; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:69:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inpath[128]; /* Pathname for input region file */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:84:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:343:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inpath[128]; /* Pathname for input region file */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:525:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (tabpath,"/data/index.dat"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:535:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *star1 = atoi (line); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:538:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *star2 = atoi (line+nchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:592:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (tabpath,"/data/index.dat"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:650:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num1 = atoi (line); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:651:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num2 = atoi (line+nchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:771:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (ty2path, "/data/catalog.dat"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:784:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(fcat = fopen (ty2path, "r"))) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:938:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((diskfile = fopen (filename, "r")) == NULL) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:29:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char usa1path[64]="/data/usnosa10"; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:33:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char usa2path[64]="/data/usnosa20"; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:39:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ua1path[64]="/data/ua1"; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:45:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ua2path[64]="/data/ua2"; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:50:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cdroot[32]="/cdrom"; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:53:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cdname[11][8]={"ua001","ua002","ua003","ua004","ua005","ua006", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:184:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ispc[2]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:186:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:512:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ispc[2]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:810:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rastrx[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:830:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rastr[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:874:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zonepath[64]; /* Pathname for input UA zone file */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:893:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(fcat = fopen (zonepath, "r"))) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ujcread.c:17:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cdu[64]="/data/ujcat/catalog"; /* pathname of UJ 1.0 CDROM */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ujcread.c:83:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ujcread.c:97:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[128]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ujcread.c:359:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[128]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ujcread.c:565:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rastrx[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ujcread.c:584:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rastr[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ujcread.c:628:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zonepath[128]; /* Pathname for input UJ zone file */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ujcread.c:647:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(fcat = fopen (zonepath, "r"))) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:75:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char vimoswcserrmsg[80]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:76:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char vimoswcsfile[256]={""}; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:155:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->c1type,"RA"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:156:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->c2type,"DEC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:162:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->ctype[0],"RA---"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:163:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->ctype[1],"DEC--"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:182:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:184:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:281:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:283:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:317:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctypes[30][4]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:319:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[0], "LIN"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:320:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[1], "AZP"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:321:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[2], "TAN"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:322:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[3], "SIN"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:323:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[4], "STG"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:324:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[5], "ARC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:325:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[6], "ZPN"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:326:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[7], "ZEA"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:327:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[8], "AIR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:328:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[9], "CYP"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:329:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[10], "CAR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:330:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[11], "MER"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:331:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[12], "CEA"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:332:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[13], "COP"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:333:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[14], "COD"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:334:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[15], "COE"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:335:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[16], "COO"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:336:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[17], "BON"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:337:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[18], "PCO"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:338:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[19], "GLS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:339:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[20], "PAR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:340:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[21], "AIT"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:341:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[22], "MOL"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:342:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[23], "CSC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:343:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[24], "QSC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:344:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[25], "TSC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:345:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[26], "NCP"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:346:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[27], "DSS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:347:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[28], "PLT"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:348:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (ctypes[29], "TNX"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:463:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"NPOLE"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:470:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"SPA"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:640:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys, "FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:661:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys, "FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1125:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vimoswcstring[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1462:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[120]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1463:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comform[120]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1464:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char xystring[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1476:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (comform, "sgsc -ah %s"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1486:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf (xystring, "%.2f %.2f", xfile, yfile); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1566:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (vimoswcs->radecout+1,"%.4f", vimoswcs->equinox); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1578:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecout, "B1950"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1583:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (vimoswcs->radecout+1,"%.4f", vimoswcs->equinox); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1595:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecout, "J2000"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1674:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (vimoswcs->radecin+1,"%.4f", vimoswcs->equinox); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1686:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecin, "B1950"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1691:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (vimoswcs->radecin+1,"%.4f", vimoswcs->equinox); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1703:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecin, "J2000"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1804:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rastr[32], decstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1824:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf (vimoswcstring,"Off map"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1879:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (vimoswcstring," galactic"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1886:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (vimoswcstring," ecliptic"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1888:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (vimoswcstring," ecliptic"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1896:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (vimoswcstring," planet"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1898:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (vimoswcstring," planet"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1906:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (vimoswcstring," alt-az"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1908:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (vimoswcstring," alt-az"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1916:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (vimoswcstring," long-npa"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1918:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (vimoswcstring," long-npa"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1926:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (vimoswcstring," long-spa"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1928:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (vimoswcstring," long-spa"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1976:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat (vimoswcstring, " linear"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:2371:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char vimoswcscoor0[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:2384:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *vimoswcscom0[10]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:2405:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char envar[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:2412:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (envar, "WCS_COMMAND"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:2414:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (envar, "WCS_COMMAND%d", i); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.h:73:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char instrument[32]; /* Instrument name */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.h:74:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctype[4][9]; /* Values of CTYPEn keywords */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.h:75:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c1type[9]; /* 1st coordinate type code: data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.h:77:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c2type[9]; /* 2nd coordinate type code: data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.h:79:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ptype[9]; /* projection type code: data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.h:81:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char units[4][32]; /* Units if LINEAR */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.h:82:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char radecsys[32]; /* Reference frame: FK4, FK4-NO-E, FK5, GAPPT*/ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.h:83:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char radecout[32]; /* Output reference frame: FK4,FK5,GAL,ECL */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.h:84:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char radecin[32]; /* Input reference frame: FK4,FK5,GAL,ECL */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.h:92:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char center[32]; /* Center coordinates (with frame) */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.h:99:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *command_format[10]; /* WCS command formats */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscat.h:90:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char isp[4]; /* Spectral type or other 2-char identifier */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscat.h:101:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char objname[32]; /* Object name */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscat.h:135:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char isfil[24]; /* Star catalog file name */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscat.h:136:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char isname[64]; /* Star catalog description */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscat.h:145:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char incdir[128]; /* Catalog directory pathname */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscat.h:146:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char incfile[32]; /* Catalog file name */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscat.h:175:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyid[16]; /* Entry name for ID */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscat.h:176:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyra[16]; /* Entry name for right ascension */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscat.h:177:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keydec[16]; /* Entry name for declination */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscat.h:178:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keymag1[16]; /* Entry name for first or only magnitude */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscat.h:179:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keymag2[16]; /* Entry name for second magnitude, if present */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscat.h:180:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyrpm[16]; /* Entry name for right ascension proper motion */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscat.h:181:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keydpm[16]; /* Entry name for declination proper motion */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscat.h:182:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keypeak[16]; /* Entry name for integer code */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscat.h:183:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keytype[16]; /* Entry name for spectral type */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscat.h:184:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyadd[16]; /* Entry name for additional keyword */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscat.h:270:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char white[MAXWHITE]; /* Whitespace (separator) characters */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscat.h:271:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tok1[MAXTOKENS]; /* Pointers to start of tokens */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscon.c:681:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (cstr, "XY"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscon.c:712:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (cstr, "B1950"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscon.c:714:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (cstr, "B%7.2f", equinox); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscon.c:722:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (cstr, "galactic"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscon.c:724:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (cstr, "ecliptic"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscon.c:727:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (cstr, "J2000"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscon.c:729:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (cstr, "J%7.2f", equinox); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscon.c:737:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (cstr, "PLANET"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcscon.c:1650:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf (eqcoor,"%02d:%02d:%06.3f %c%02d:%02d:%05.2f", data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:39:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vimoswcserrmsg[80]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:92:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[12]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:93:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *upval, value[72]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:107:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (keyword, "WCSNAME"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:201:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctype1[32], ctype2[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:207:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[16], keycdelt[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:214:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vimoswcsname[16]; /* Name of WCS depended on by current WCS */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:270:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"WCSDEP%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:282:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CTYPE1%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:286:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CTYPE2%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:297:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CTYPE3%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:300:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CTYPE4%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:311:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CUNIT1%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:318:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CUNIT2%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:329:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CRPIX1%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:332:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CRPIX2%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:337:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CRVAL1%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:340:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CRVAL2%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:357:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"LONPOLE%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:361:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"LATPOLE%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:370:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"PROJR0%c", mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:374:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"PV%d%c",i, mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:382:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CD1_1%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:384:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CD1_2%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:386:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CD2_1%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:388:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CD2_2%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:390:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keycdelt, "CDELT1%c", mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:394:12: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void)strcpy (vimoswcs->ptype, "PLATE"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:396:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CO1_%d", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:403:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CO2_%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:447:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword, "CDELT2%c", mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:540:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CROTA2%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:543:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CROTA1%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:605:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:607:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:619:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"PPO%d", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:625:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"AMDX%d", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:631:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"AMDY%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:636:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void)strcpy (vimoswcs->c1type, "RA"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:637:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void)strcpy (vimoswcs->c2type, "DEC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:638:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void)strcpy (vimoswcs->ptype, "DSS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:643:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->ctype[0], "RA---DSS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:644:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->ctype[1], "DEC--DSS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:820:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys, "LINEAR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:824:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecout, "FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:826:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecout, "FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:869:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char systring[32], eqstring[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:870:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char radeckey[16], eqkey[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:876:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (eqkey, "EQUINOX%c", mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:878:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (eqkey, "EQUINOX"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:882:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (radeckey,"RADESYS%c", mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:884:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (radeckey, "RADECSYS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:890:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ieq = atoi (eqstring+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:891:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (systring, "FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:895:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ieq = atoi (eqstring+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:896:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (systring, "FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:941:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (systring,"FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:973:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"GALACTIC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:975:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"ECLIPTIC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:977:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"SGALACTC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:979:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"HELIOECL"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:981:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"ALTAZ"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:983:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"LINEAR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:989:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:991:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:32:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vimoswcserrmsg[80]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:57:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctype1[32], ctype2[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:63:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:199:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"PROJP%d",i); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:212:12: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void)strcpy (vimoswcs->ptype, "PLATE"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:214:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CO1_%d", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:221:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CO2_%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:419:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:421:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:433:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"PPO%d", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:439:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"AMDX%d", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:445:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"AMDY%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:450:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void)strcpy (vimoswcs->c1type, "RA"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:451:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void)strcpy (vimoswcs->c2type, "DEC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:452:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void)strcpy (vimoswcs->ptype, "DSS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:457:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->ctype[0], "RA---DSS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:458:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->ctype[1], "DEC--DSS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:630:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys, "LINEAR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:634:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecout, "FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:636:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecout, "FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:663:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char systring[32], eqstring[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:671:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ieq = atoi (eqstring+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:672:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (systring, "FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:676:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ieq = atoi (eqstring+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:677:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (systring, "FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:722:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (systring,"FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:754:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"GALACTIC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:756:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"ECLIPTIC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:758:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"SGALACTC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:760:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"HELIOECL"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:762:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"ALTAZ"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:764:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"LINEAR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:770:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:772:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:32:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vimoswcserrmsg[80]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:57:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctype1[32], ctype2[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:63:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:199:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"PROJP%d",i); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:212:12: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void)strcpy (vimoswcs->ptype, "PLATE"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:214:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CO1_%d", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:221:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CO2_%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:419:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:421:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:433:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"PPO%d", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:439:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"AMDX%d", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:445:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"AMDY%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:450:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void)strcpy (vimoswcs->c1type, "RA"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:451:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void)strcpy (vimoswcs->c2type, "DEC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:452:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void)strcpy (vimoswcs->ptype, "DSS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:457:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->ctype[0], "RA---DSS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:458:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->ctype[1], "DEC--DSS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:630:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys, "LINEAR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:634:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecout, "FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:636:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecout, "FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:663:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char systring[32], eqstring[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:671:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ieq = atoi (eqstring+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:672:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (systring, "FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:676:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ieq = atoi (eqstring+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:677:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (systring, "FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:722:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (systring,"FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:754:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"GALACTIC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:756:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"ECLIPTIC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:758:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"SGALACTC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:760:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"HELIOECL"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:762:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"ALTAZ"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:764:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"LINEAR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:770:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:772:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:39:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vimoswcserrmsg[80]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:94:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[12]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:95:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *upval, value[72]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:109:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (keyword, "WCSNAME"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:203:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctype1[32], ctype2[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:209:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[16], keycdelt[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:216:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vimoswcsname[16]; /* Name of WCS depended on by current WCS */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:270:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"WCSDEP%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:282:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CTYPE1%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:286:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CTYPE2%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:297:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CTYPE3%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:300:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CTYPE4%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:311:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CUNIT1%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:318:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CUNIT2%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:329:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CRPIX1%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:332:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CRPIX1%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:337:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CRVAL1%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:340:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CRVAL2%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:357:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"LONPOLE%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:361:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"LATPOLE%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:370:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"PROJR0%c", mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:374:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"PV%d%c",i, mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:382:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CD1_1%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:384:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CD1_2%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:386:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CD2_1%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:388:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CD2_2%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:390:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keycdelt, "CDELT1%c", mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:394:12: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void)strcpy (vimoswcs->ptype, "PLATE"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:396:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CO1_%d", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:403:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CO2_%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:447:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword, "CDELT2%c", mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:540:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CROTA2%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:543:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"CROTA1%c",mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:605:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:607:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:619:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"PPO%d", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:625:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"AMDX%d", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:631:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"AMDY%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:636:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void)strcpy (vimoswcs->c1type, "RA"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:637:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void)strcpy (vimoswcs->c2type, "DEC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:638:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void)strcpy (vimoswcs->ptype, "DSS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:643:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->ctype[0], "RA---DSS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:644:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->ctype[1], "DEC--DSS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:819:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys, "LINEAR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:823:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecout, "FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:825:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecout, "FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:868:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char systring[32], eqstring[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:869:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char radeckey[16], eqkey[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:875:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (eqkey, "EQUINOX%c", mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:877:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (eqkey, "EQUINOX"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:881:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (radeckey,"RADESYS%c", mchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:883:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (radeckey, "RADECSYS"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:889:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ieq = atoi (eqstring+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:890:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (systring, "FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:894:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ieq = atoi (eqstring+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:895:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (systring, "FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:940:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (systring,"FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:972:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"GALACTIC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:974:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"ECLIPTIC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:976:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"SGALACTC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:978:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"HELIOECL"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:980:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"ALTAZ"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:982:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"LINEAR"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:988:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:990:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (vimoswcs->radecsys,"FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c:426:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char requir[9]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c:459:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(vimoswcs->pcode, "%.3s", &ctype[j][5]); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c:463:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(vimoswcs->lngtyp, "RA"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c:464:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(vimoswcs->lattyp, "DEC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c:469:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(vimoswcs->lngtyp, "RA"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c:470:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(vimoswcs->lattyp, "DEC"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c:475:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(vimoswcs->lngtyp, "%cLON", ctype[j][0]); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c:476:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(vimoswcs->lattyp, "%cLAT", ctype[j][0]); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c:481:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(vimoswcs->lngtyp, "%cLON", ctype[j][0]); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c:482:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(vimoswcs->lattyp, "%cLAT", ctype[j][0]); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c:555:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(vimoswcs->pcode, "SIN"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c:689:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(vimoswcs->pcode, "SIN"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.h:165:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char pcodes[25][4]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.h:239:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pcode[4]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.h:240:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lngtyp[5], lattyp[5]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcspoly.c:200:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcspoly.c:205:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"PX1_%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcspoly.c:211:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"PX2_%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcspoly.c:227:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[16]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcspoly.c:231:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"PX1_%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcspoly.c:236:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (keyword,"PX2_%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:78:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char srchurl[LINE]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:79:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[64]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:84:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:99:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (temp, "radius=%.3f&",dtemp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:104:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (temp, "dra=%.3f&",dtemp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:107:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (temp, "ddec=%.3f&",dtemp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:111:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (temp, "mag1=%.2f&mag=%.2f&",mag1,mag2); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:115:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (temp, "epoch=%.5f&", epout); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:128:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (srchurl, "?ra=%.7f&dec=%.7f&", ra, dec); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:131:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (temp, "radius=%.3f&",dtemp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:136:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (temp, "radius=%.3f&",dtemp*60.0); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:138:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (temp, "radius=%.3f&",ddec*60.0); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:141:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (temp, "nout=%d&mime=skycat", nstarmax); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:153:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (srchurl, "?ra=%.7f&dec=%.7f&", ra, dec); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:156:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (temp, "radius=%.3f&",dtemp); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:160:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (temp, "radius=%.3f&",dra*3600.0); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:162:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (temp, "radius=%.3f&",ddec*3600.0); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:166:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (temp, "mag=%.2f,%.2f&", mag1, mag2); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:169:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (temp, "format=8&sort=mr"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:223:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char srchurl[LINE]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:224:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char numlist[LINE]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:225:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char numstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:226:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char csys[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:229:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[64]; /* Description of catalog (returned) */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:233:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstr[32]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:234:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[64]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:254:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (temp, "epoch=%.5f&", epout); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:294:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuff[LINE]; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:558:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostname[MAXHOSTNAMELENGTH + 12]; /* name of host */ data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:606:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&adrinet->sin_addr, hp->h_addr_list[0], hp->h_length); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_cat.c:287:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullname[FILENAME_SZBUF]; data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_plugin.c:493:34: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). stream = is_debug ? stdout : fopen("/dev/null", "a"); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_plugin.c:655:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). = svalue ? atoi(svalue) : cpl_parameter_get_default_bool(p); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_plugin.c:661:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). = svalue ? atoi(svalue) : cpl_parameter_get_default_int(p); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_plugin.c:1030:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[LINE_LEN_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_plugin.c:1031:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[LINE_LEN_MAX + 1], group[LINE_LEN_MAX + 1], tag[LINE_LEN_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_plugin.c:1037:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(name, "r"); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_utils.c:1010:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). stream = fopen(rawfile, "r"); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_wlxcorr.c:738:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title_loc[1024] ; data/cpl-plugin-vimos-4.1.1+dfsg/irplib/tests/irplib_utils-test.c:130:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zero[100] = {0}; data/cpl-plugin-vimos-4.1.1+dfsg/irplib/tests/irplib_utils-test.c:168:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[32] = ""; data/cpl-plugin-vimos-4.1.1+dfsg/irplib/tests/irplib_utils-test.c:256:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). file = fopen(filename1, "w"); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/tests/irplib_utils-test.c:260:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). file = fopen(filename2, "w"); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/tests/irplib_wlxcorr-test.c:134:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ? fopen("/dev/null", "a") : stdout; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/dict.c:1200:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef char input_t[256]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/dict.c:1239:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new, str, sz); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/dict.c:1465:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int dictnum = atoi(tok1); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/dict.c:1478:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int dict1 = atoi(tok1), dict2 = atoi(tok2); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/dict.c:1478:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int dict1 = atoi(tok1), dict2 = atoi(tok2); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/hash.c:851:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef char input_t[256]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/hash.c:885:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new, str, sz); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/list.c:781:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef char input_t[256]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/list.c:820:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new, str, sz); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/md5.c:103:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void MD5Final(unsigned char digest[16], struct MD5Context *ctx) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/md5.h:10:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char in[64]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/md5.h:16:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void MD5Final(unsigned char digest[16], struct MD5Context *context); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcdb.c:409:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (!memcpy(db_value->value, value, sz)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcdb.c:1059:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfgline[PIL_LINE_LENGTH_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcdb.c:1060:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char grpname[PIL_LINE_LENGTH_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcdb.c:1061:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyname[PIL_LINE_LENGTH_MAX + 1], keyvalue[PIL_LINE_LENGTH_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildate.c:57:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char timeISO8601[TIME_ISO8601_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:137:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PIL_PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:212:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s, instrument, strlen(instrument) + 1); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:707:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(cfgfile = fopen(filename, "w"))) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:776:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(cfgfile = fopen(filename, "r"))) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:807:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(cfgfile = fopen(filename, "r"))) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:836:34: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (filename && (cfgfile = fopen(filename, "r"))) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:844:34: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (filename && (cfgfile = fopen(filename, "r"))) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:150:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char spath[PIL_PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:151:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tpath[2 * (PIL_PATHNAME_MAX + 1)]; /* Avoid buffer overflow */ data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:287:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fits_record[FITS_RECORD_SIZE]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:290:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((file = fopen(filename, "r"))) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:331:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char paf_record[PAF_RECORD_SIZE + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:334:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((file = fopen(filename, "r"))) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:394:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char basename[PIL_PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:397:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tfile[PIL_PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:451:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char dirname[PIL_PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:511:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char expanded_path[PIL_PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:513:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tpath[PIL_PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c:104:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char card[PIL_FITS_CARD_MAX]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c:105:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[PIL_FITS_CARD_MAX]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c:106:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[PIL_FITS_VALUE_MAX]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c:107:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[2]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c:498:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. TLOGICAL, (char *)keyName, f[value], (char *)comment, &status)) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c:674:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char card[FLEN_CARD]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c:738:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char card[FLEN_CARD]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c:805:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char card[FLEN_CARD]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c:872:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char card[FLEN_CARD]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c:956:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char datecard[FLEN_CARD]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c:957:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char card[FLEN_CARD]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c:1088:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dummy[FLEN_CARD]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c:1266:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[FLEN_CARD]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c:1325:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char card[FLEN_CARD]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c:1410:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char datamd5[MD5HASHSZ+1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c:1412:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[16]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c:1414:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PIL_FITS_BLOCK_SIZE]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c:1428:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((in = fopen(filename, "r")) == NULL) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfits.c:1540:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(datamd5, data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilframe.c:275:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(frame->filename, filename, length); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilframeset.c:446:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sofline[PIL_LINE_LENGTH_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilframeset.c:450:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(fp = fopen(filename, "r"))) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilframeset.c:455:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PIL_LINE_LENGTH_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilframeset.c:456:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char group[PIL_LINE_LENGTH_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilframeset.c:457:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[PIL_LINE_LENGTH_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilframeset.c:541:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen(filename, "w"); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:81:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char recipeName[MAX_RECIPE_NAME] = "Undefined"; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:82:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char logfileName[MAX_LOGFILE_NAME] = ".logfile"; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:147:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_MESSAGE_LENGTH + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:185:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_MESSAGE_LENGTH + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:273:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char messageText[MAX_MESSAGE_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:274:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char messageLog[MAX_MESSAGE_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:275:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char messageTerminal[MAX_MESSAGE_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:347:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(messageTerminal, ": "); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:360:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(messageTerminal, "() "); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:364:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(messageLog, "() "); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:527:27: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((logfilePointer = fopen(logfileName, "w")) == NULL) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:226:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(record->data.sval, value, sz); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:266:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(record->data.sval, value, sz); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:597:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(record->data.sval, value, sz); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:615:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[PAF_RECORD_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:616:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[PAF_RECORD_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:1616:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(record->comment, comment, sz + 1); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:2408:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). stream = fopen(_pilPAFGetValueString(paf->header, PAF_NAME), "wb"); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:2448:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[PAF_RECORD_MAX]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c:58:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char pafName[MAX_PAF_NAME_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c:71:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char version[DICT_LINE_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c:72:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[DICT_LINE_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c:79:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(fp = fopen(name, "r"))) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:250:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((src = open(srcpath, O_RDONLY)) == -1) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:258:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((dst = open(dstpath, O_CREAT | O_WRONLY | O_TRUNC, data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:571:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char optfmt[64], optname[4096]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:572:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[4096]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:893:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *name = (char *)rpar[np].name; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:986:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char category[PIL_CATEGORY_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1080:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(name, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1096:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(name, ".paf"); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1150:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char srcfile[PIL_PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1247:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linkname[PIL_PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1352:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd[PIL_PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1353:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char srcfile[PIL_PATHNAME_MAX + 1], dstfile[PIL_PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1755:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. name = (char *)options[option_index].name; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1982:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char logfile_dir[PIL_PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:2124:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char product_dir[PIL_PATHNAME_MAX + 1], export_dir[PIL_PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:2217:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char product_name[PIL_PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:2283:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char product_name[PIL_PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilstrutils.c:86:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s, string, sz); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilstrutils.c:122:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s, string, n); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltimer.c:401:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tstring[11]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltimer.c:410:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tstring, "%4d-%02d-%02d", data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltimer.c:441:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tstring[12]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltimer.c:450:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tstring, "%02d:%02d:%02d.%03ld", data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltimer.c:483:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tstring[29]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltimer.c:530:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tstring[24]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltimer.c:540:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tstring, "%4d-%02d-%02dT%02d:%02d:%02d.%03ld", data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:984:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[PIL_LINE_LENGTH_MAX]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:985:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alias[PIL_LINE_LENGTH_MAX]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:986:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[PIL_LINE_LENGTH_MAX]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:987:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char form[PIL_LINE_LENGTH_MAX]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:988:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[PIL_LINE_LENGTH_MAX]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:992:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen (filename, "r")) == NULL) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:1152:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). n = atoi(p); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:1224:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char translation[MAX_TRN_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:1261:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). n = atoi(p); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:1574:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[PIL_LINE_LENGTH_MAX]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:1575:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alias[PIL_LINE_LENGTH_MAX]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:1576:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[PIL_LINE_LENGTH_MAX]; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:1580:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen (filename, "r")) == NULL) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilutils.c:240:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char split[MAX_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/casu_utilfunctions.c:17:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *notabkeys[NNOTABKEYS] = {"^CRVAL[1-2]*$","^CRPIX[1-2]*", data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/casu_utilfunctions.c:306:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[9],key2[9]; data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/classify.c:97:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *g_colsfull[NCOLFULL] = {"Aper_flux_3","Aper_flux_1","Aper_flux_4", data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/classify.c:207:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *cols[ MAX(NCOL32, NCOLFULL) ], colname[32]; data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/classify.c:233:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cols[i] = (char *)g_colsfull[i]; data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/classify.c:288:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(colname,"Areal_%zd_profile",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/create_table.c:304:49: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern int imcore_do_seeing_gen(ap_t *ap, const char *col_ellipt, data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/create_table.c:305:32: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *col_pkht, char *col_areals[NAREAL], data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/create_table.c:305:48: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *col_pkht, char *col_areals[NAREAL], data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/create_table_6.c:95:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *ttype[NCOLS]={"Sequence_number","Isophotal_flux", data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/create_table_6.c:124:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *tunit[NCOLS]={"Number","ADU", data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/create_table_6.c:273:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *areal_colnames[NAREAL]; data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/create_table_6.c:278:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. areal_colnames[i] = (char *)ttype[g_areal_cols[i]-1]; data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/catalogue/imcore_conf.c:164:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char card[64]; data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_collapse.c:1863:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ddst + y, dsrc, cpl_vector_get_size(src->reject_low)); data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_collapse.c:1866:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ddst + y, dsrc, cpl_vector_get_size(src->reject_high)); data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_utils.c:484:18: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). int fd = mkstemp(template); data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_utils.c:775:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ddata, sdata, naxis1 * naxis2 * sizeof(ddata[0])); data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_utils.c:1514:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dstatus[i], cpl_array_get_data_int(lstatus), data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/global_distortion.cpp:138:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/global_distortion.cpp:257:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/mosca/libmosca/spatial_distortion.cpp:352:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_bias.c:249:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alldesc[SZ_ALLDESC]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_bias.c:417:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *vimos_names[VIMOS_NEXTN]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_bias.c:603:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outfile[3][BUFSIZ],dateobs[81]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_dark.c:274:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alldesc[SZ_ALLDESC]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_dark.c:457:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *vimos_names[VIMOS_NEXTN]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_dark.c:730:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outfile[3][BUFSIZ],dateobs[81]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_det_noise.c:58:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char extname[11]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_det_noise.c:181:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alldesc[SZ_ALLDESC]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_det_noise.c:315:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *vimos_names[VIMOS_NEXTN]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_fringe.c:223:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alldesc[SZ_ALLDESC]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_fringe.c:379:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bname[BUFSIZ],*vimos_names[VIMOS_NEXTN]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_fringe.c:800:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *fname,*bname,filter[16],dateobs[32]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:435:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alldesc[SZ_ALLDESC]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:771:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filt[16],projid[16],*fname,bname[BUFSIZ],*junk1,*junk2,pcat[32]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:772:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *vimos_names[VIMOS_NEXTN],*assoc[2],photosys[8]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:1162:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void)strcpy(photosys,"VEGA"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:2000:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filt[32]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:2185:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bname[BUFSIZ],filt[32],*base,*tname,prop[9]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:2428:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bname[BUFSIZ],*base,*tname,filt[32],prop[9]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:2580:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bname[BUFSIZ],*base,*tname; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:2832:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpfname[BUFSIZ]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:3052:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filter[16]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:363:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alldesc[SZ_ALLDESC]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:640:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filt[16],projid[16],*fname,bname[BUFSIZ],*junk1,*junk2,*pcat; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:641:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *vimos_names[VIMOS_NEXTN],*assoc,photosys[8]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:1448:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filt[32]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:1634:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filt[32]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_twilight_flat.c:308:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alldesc[SZ_ALLDESC]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_twilight_flat.c:512:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *vimos_names[VIMOS_NEXTN]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_twilight_flat.c:893:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outfile[5][BUFSIZ],dateobs[81],filter[16]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_science.cc:895:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[80]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_science.cc:1428:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[80]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmbias.cc:532:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[80]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmbias.cc:538:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mbiasName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmdark.c:624:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char masterDarkName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmdark.c:625:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[MAX_COMMENT_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmdark.c:1645:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(masterDarkName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmdet.c:396:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char badPixelImageName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmdet.c:397:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errorImageName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmdet.c:398:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ccdTableName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmdet.c:1510:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(ccdTableName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmdet.c:1542:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(badPixelImageName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmdet.c:1576:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errorImageName, "errorImage"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmdet.c:1577:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(errorImageName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:549:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char masterFlatName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:550:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char extraName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:551:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char traceName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:552:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char transName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:553:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char idsName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:554:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parName[50]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:555:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[5]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:603:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char unit[20]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:604:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:605:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char grismName[20]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:606:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filterName[20]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:607:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifuShutter[10]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:1357:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(parName, "ESO QC IFU LOST%d", slit + 1); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:1362:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(parName, "ESO QC IFU TRACE%d RMS", slit + 1); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:1367:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(parName, "ESO QC IFU REFROW%d", slit + 1); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:1372:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(parName, "ESO QC IFU TRACE%d CENTRAL", slit + 1); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:1377:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(parName, "ESO QC IFU TRACE%d SLOPE", slit + 1); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:1383:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(parName, "ESO QC IFU TRACE%d COEFF%d", slit + 1, i); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:1475:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(parName, "ESO QC IFU WAVELOST%d", slit + 1); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:1478:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(parName, "ESO QC IFU WAVECAL%d COEFF%d", slit + 1, i); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:1725:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(traceName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:1742:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(colName, "c%d", i); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:1862:11: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(idsName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:1878:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(colName, "c%d", i); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:1953:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(transName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2361:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(parName, "QC.IFU.REFROW%d", slit + 1); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2370:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(parName, "QC.IFU.LOST%d", slit + 1); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2379:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(parName, "QC.IFU.TRACE%d.RMS", slit + 1); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2388:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(parName, "QC.IFU.TRACE%d.CENTRAL", slit + 1); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2397:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(parName, "QC.IFU.TRACE%d.SLOPE", slit + 1); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2405:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(parName, "QC.IFU.TRACE%d.COEFF%d", slit + 1, i); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2409:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(unit, "pixel"); break; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2411:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(unit, "pixel/pixel"); break; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2413:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(unit, "pixel/pixel^%d", i); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2416:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(comment, "Median coefficient %d of tracing", i); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2692:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(parName, "QC.IFU.WAVELOST%d", slit + 1); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2698:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(parName, "QC.IFU.WAVECAL%d.COEFF%d", slit + 1, i); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2702:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(unit, "pixel"); break; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2704:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(unit, "pixel/Angstrom"); break; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2706:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(unit, "pixel/Angstrom^%d", i); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2709:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(comment, "Median coefficient %d of IDS", i); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2806:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(masterFlatName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2855:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(extraName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucalib.c:2883:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(extraName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucombine.c:287:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fovName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucombine.c:300:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tplStart[24], atplStart[24]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucombine.c:476:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(fovName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucombinecube.cc:368:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cubeName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucombinecube.cc:387:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tplStart[24]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucombinecube.cc:707:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(cubeName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:388:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outIdsName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:390:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outTraceName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:392:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reducedName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:393:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fovName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:395:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char grismName[20]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:396:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filterName[20]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:397:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifuShutter[10]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:491:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tablename[1024]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:1032:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(outTraceName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:1117:11: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(outIdsName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:1671:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(reducedName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:1700:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(fovName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifuscience.c:1729:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(reducedName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:375:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reducedName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:376:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fovName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:377:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char skyName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:378:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char starName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:379:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sphotTableName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:380:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parName[30]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:382:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char grismName[20]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:383:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filterName[20]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:384:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifuShutter[10]; data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:1844:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(parName, "QC.IFU.EFFICIENCY%d.LAMBDA", i + 1); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:1848:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(parName, "QC.IFU.EFFICIENCY%d", i + 1); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:1870:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(sphotTableName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:2090:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(reducedName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:2124:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(fovName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:2155:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(skyName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifustandard.c:2183:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(starName, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmspphot.c:300:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char output1DName[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:615:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:641:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:1216:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:1775:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:1929:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:2056:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:2364:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:2574:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:3213:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:3344:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:3748:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:5901:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:5908:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:8404:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trace_id[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:8828:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trace_id[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:8829:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trace_res[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:8830:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trace_mod[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:8831:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:8985:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:9168:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:9597:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:9604:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:10364:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:10653:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:10682:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char offname[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:10683:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:11144:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:11208:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char offname[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:11250:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:11388:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:11413:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:11414:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fname[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:12030:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:12115:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:12228:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:12578:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:13669:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:14528:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:14803:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:15179:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:15324:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). max_satur = atoi(max_saturated); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:15742:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyname[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:15981:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyname[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16394:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyname[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16434:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS SLIT%d X", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16440:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS SLIT%d Y", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16447:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS SLIT%d X", j+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16453:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS SLIT%d Y", j+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16462:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS SLIT%d ID", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16468:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS SLIT%d ID", j+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16494:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS REF%d X", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16500:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS REF%d Y", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16507:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS REF%d X", j+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16513:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS REF%d Y", j+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16522:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS REF%d ID", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16528:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS REF%d ID", j+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16570:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS SLIT%d X", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16572:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS SLIT%d Y", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16576:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS SLIT%d X", j+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16578:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS SLIT%d Y", j+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16592:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS SLIT%d ID", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16595:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS SLIT%d DIMX", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16602:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS SLIT%d BEZIER DY", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16607:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS SLIT%d DIMY", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16630:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS REF%d X", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16632:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS REF%d Y", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16636:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS REF%d X", j+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16638:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS REF%d Y", j+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16652:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS REF%d ID", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16655:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS REF%d DIMX", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:16662:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO INS REF%d DIMY", i+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_calib_impl.cc:284:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_calib_impl.cc:2198:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_calib_mult.cc:291:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_calib_mult.cc:2422:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_chop_region.c:84:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reg[64]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_chop_region.c:118:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf(reg,"[%d:%d,%d:%d]",imin,imax,jmin,jmax); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:217:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char package[PACKSZ]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:294:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char package[PACKSZ]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:341:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(filename, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:1083:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(filename, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:1262:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(filename, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:1526:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(filename, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:1566:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(filename, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:1615:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(filename, ".fits"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_flat_normalise.cc:102:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *clab[6] = {"c0", "c1", "c2", "c3", "c4", "c5"}; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_imaging_utils.c:317:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[16]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_imaging_utils.c:377:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[16]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_imaging_utils.c:436:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name1[16],name2[16]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_imaging_utils.c:665:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chipname[16]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_imaging_utils.c:684:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. vimos_names[i] = (char *)vimos_oldnames[i]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_imaging_utils.c:687:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. vimos_names[i] = (char *)vimos_newnames[i]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_imaging_utils.c:717:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chipname[16]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_imaging_utils.c:1251:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[16]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_imaging_utils.h:42:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *vimos_newnames[VIMOS_NEXTN] = {"BRIAN","Keith","Tom", data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_imaging_utils.h:44:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *vimos_oldnames[VIMOS_NEXTN] = {"CCD-59B","CCD-59A","CCD-60A", data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_imaging_utils.h:67:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_pfits.c:177:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[64]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_response.cc:108:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_response.cc:339:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_science_impl.cc:208:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_science_impl.cc:1676:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyname[40]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_science_impl.cc:1703:25: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO QC MOS EFFICIENCY%d LAMBDA", data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_science_impl.cc:1711:25: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(keyname, "ESO QC MOS EFFICIENCY%d", i + 1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_science_impl.cc:2407:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmadf.c:429:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char descVal[81]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmadf.c:483:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strValue[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmadf.c:1720:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char descVal[81]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmadfifutable.c:50:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmccdtable.c:248:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char instMode[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmdetector.c:1359:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[MAX_COMMENT_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmdetector.c:1533:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[MAX_COMMENT_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmdistmodels.c:545:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmdistmodels.c:567:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(string, "%#.14E", optModX->coefs[i][j]); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmdistmodels.c:586:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(string, "%#.14E", optModY->coefs[i][j]); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmdistmodels.c:828:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmdistmodels.c:843:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(string, "%#.14E", crvMod->coefs[i]->coefs[j][k]); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmdistmodels.c:962:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmdistmodels.c:978:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(string, "%#.14E", idsMat->coefs[i]->coefs[j][k]); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmextractiontable.c:373:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[72]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmextractiontable.c:781:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmextractiontable.c:782:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmextractiontable.c:943:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(colName,"CRV_POL_%d",i); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmextractiontable.c:959:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(colName,"INV_DIS_%d",i); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmextractiontable.c:1236:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmextractiontable.c:1238:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ttype[84], *tform[84], comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmextractiontable.c:1324:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(colName,"CRV_POL_%d",i); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmextractiontable.c:1332:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(colName,"INV_DIS_%d",i); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmextractiontable.h:157:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[VM_DESC_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmfit.c:1072:19: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (i || j) sprintf(pos, " (%d,%d)", i, j); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmfit.c:1073:19: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(pos, "(%d,%d)", i, j); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmgrismtable.c:100:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char descName[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmgrismtable.c:101:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmgrismtable.c:122:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(descName,"ESO PRO SKY WLEN%d",i+1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:2388:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:2830:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:2977:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:3071:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:3239:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:3505:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:3743:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:3744:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bakName[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:3887:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char distance[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:3888:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char flux[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:4025:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char distance[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:4026:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char flux[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:4146:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char distance[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:4147:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char flux[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:4460:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:4575:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:4684:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:4869:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:4971:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:5052:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:5158:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colTrace[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:5159:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colSpectrum[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:5379:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colTrace[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:5380:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colSpectrum[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:5483:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colTrace[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:5484:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colSpectrum[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:5676:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colSpectrum[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:5959:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:6176:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:6370:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:6503:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:6576:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colName[MAX_COLNAME]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifu.c:6583:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tablename[1024]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifufibers.c:94:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifufibers.c:1576:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifuflat.c:68:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifuflat.c:133:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifuimage.c:64:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifuimage.c:192:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifusky.c:70:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifusphotcalib.c:71:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifutable.c:402:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char fileName[20] = "ifuTable.dat"; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifutable.c:403:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ofp = fopen(fileName, "w"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifutable.c:458:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifutable.c:776:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ttype[84], *tform[84]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifutable.h:218:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[VM_DESC_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifuutils.c:66:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmifuutils.c:481:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimage.c:152:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[FLEN_KEYWORD], value[FLEN_VALUE], value1[FLEN_VALUE]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimage.c:153:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[FLEN_COMMENT], comment1[FLEN_COMMENT]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimage.c:154:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[1]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimage.c:234:33: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tDesc = newIntDescriptor(name, atol(value), comment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimage.c:3071:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(extNames[i-2],"Not found"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimageset.c:276:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inImaName[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimageset.c:290:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((ifp = fopen(imageList,"r")) == NULL) data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.c:350:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valcoefX[80], valcoefY[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.c:351:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[COMMENT_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.c:549:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valcoefX[80],valcoefY[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.c:550:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[COMMENT_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.c:727:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[COMMENT_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.c:728:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valcoef[80] = "0."; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.c:852:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[COMMENT_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.c:909:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[COMMENT_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.c:922:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(*pafName, "w"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.c:1187:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[COMMENT_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.c:1201:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(*pafName, "w"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.c:1715:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[COMMENT_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmlinecatalog.c:104:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmlinecatalog.c:298:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ttype[84], *tform[84]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmossphotcalib.c:105:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmossphotcalib.c:272:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmossphotcalib.c:418:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.c:894:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char grismName[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.c:895:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char grismId[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.c:951:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char grismName[10]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.c:952:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char grismId[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.c:1480:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mshuString[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.c:1707:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(pafName, "w"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.c:1904:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(pafName, "w"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.c:2030:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char grismName[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.c:2031:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[PATHNAME_MAX + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.c:2051:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(pafName, "w"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmoswavecalib.c:140:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmoswavecalib.c:617:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmoswavecalib.c:922:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmoswavecalib.c:1082:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char insMode[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmobjecttable.c:251:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmobjecttable.c:425:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ttype[84], *tform[84]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmobjecttable.h:102:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[VM_DESC_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmqcutils.c:480:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(finalList, acceptedList, acceptedCount * sizeof(VimosImage *)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmqcutils.c:481:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(finalList + acceptedCount, rejectedList, data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmqcutils.c:565:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[COMMENT_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmqcutils.c:715:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[COMMENT_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmqcutils.c:990:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(descName, "ESO "); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmqcutils.c:1063:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(descName, "ESO "); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmqcutils.c:1141:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(descName, "HIERARCH ESO "); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmqcutils.c:1225:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(descName, "HIERARCH ESO "); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmsphottable.c:102:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmsphottable.c:251:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ttype[84], *tform[84]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:114:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(newDesc->descName, "Undefined"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1230:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(newCol->colName, "Undefined"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1525:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char descName[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2668:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(column->colName, name, sz); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:3211:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(column->colName, source->colName, sz); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:3260:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(column->colValue->p, source->colValue->p, nbytes); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:3385:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[FLEN_KEYWORD], value[FLEN_VALUE], value1[FLEN_VALUE]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:3386:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[FLEN_COMMENT]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:3387:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[1]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:3460:33: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tDesc = newIntDescriptor(name, atol(value), comment); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:3517:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char charBuf[68]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:3702:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tform[colNumber],"%dA",maxLength); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:3819:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:3957:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:4166:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char card[FLEN_CARD]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.h:191:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[VM_DESC_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:986:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errText[50]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:1086:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cval[FLEN_CARD]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:1096:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errText[50]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:1097:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char card[FLEN_CARD]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:1098:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[FLEN_CARD]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:1099:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kname[FLEN_CARD]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:1100:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parName[FLEN_CARD]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:1101:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parValue[MAX_PLENGTH + 1]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:1900:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:1974:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char version[100] = PACKAGE_VERSION; //Defined in config.h data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwcsutils.c:596:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valcoef[80] = "0."; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwcsutils.c:669:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwcsutils.c:839:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (wcs->radecsys,"FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwcsutils.c:841:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (wcs->radecsys,"FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwcsutils.c:854:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (wcs->radecsys, "LINEAR"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwcsutils.c:858:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (wcs->radecout, "FK4"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwcsutils.c:860:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (wcs->radecout, "FK5"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwindowtable.c:543:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[80]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwindowtable.c:882:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ttype[84], *tform[84]; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwindowtable.h:173:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[VM_DESC_LENGTH]; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_fits.c:173:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nf = strlen(p->extname) + strlen(p->fname) + 3; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_fits.c:173:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nf = strlen(p->extname) + strlen(p->fname) + 3; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1137:12: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. while (fscanf(fd,"%8191s %1023s %g %g %g %g", data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1403:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (send(sock,buf,strlen(buf),0) < 0) { data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1513:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy(buf,url_encode(buf2),BUFSIZ); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_getstds.c:1585:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(instring); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_imcombine.c:279:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(expkey)) { data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_photcal_extinct.c:1011:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen(v); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_photcal_extinct.c:1079:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen(v); data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_tfits.c:122:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nf = strlen(p->extname) + strlen(p->fname) + 3; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_tfits.c:122:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nf = strlen(p->extname) + strlen(p->fname) + 3; data/cpl-plugin-vimos-4.1.1+dfsg/casu/src/casu_utils.c:1272:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy(out,c,len); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c:555:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lpath = strlen (cdpath) + 32; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c:596:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (actfile) < 24) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/actread.c:599:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (sc->isfil, actfile, 23); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:298:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (star->objname) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:330:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (star->objname) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:362:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (star->objname) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:565:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (star->objname) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:616:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strlen (str) < 64) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:627:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strlen (str) < 64) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:637:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strlen (str) < 64) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:657:2: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (binpath, "/"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:676:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). nr = (int) read (fcat, sc, 28); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:738:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (binfile) < 24) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:741:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (sc->isfil, binfile, 23); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:768:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lf = strlen (binfile); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/binread.c:917:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((int)read (sc->entadd, sc->catline, sc->nbent) < 1) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:242:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (star->objname) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:267:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (star->objname) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:293:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (star->objname) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:499:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (star->objname) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:571:2: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (catpath, "/"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:625:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (header, sc->catbuff, lhead); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:629:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (header, sc->catbuff, 79); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:702:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (sc->isname, catdesc, ldesc); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:704:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (sc->isname, catdesc, 63); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:856:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (st->objname, token, 31); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:965:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (st->objname, token, 31); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catread.c:1069:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (value) > 0) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:347:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lpath = (strlen (progpath0) + 2) / 8; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:352:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = strlen (progpath); i > -1; i--) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:655:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lstr = strlen (string); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:954:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lstr = strlen (string); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1070:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tokens->lline = strlen (string); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1079:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). naddw = strlen (cwhite); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1224:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (token, tokens->tok1[it], ltok); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1249:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (token, tokens->tok1[it], ltok); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1255:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (token, tokens->tok1[-it], ltok); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1259:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (token, tokens->tok1[1], ltok); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1311:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lastring = string + strlen (string); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1314:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (keyword,keyword0, sizeof(keyword)-1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1327:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (skey, "="); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/catutil.c:1354:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pval = pval + strlen (skey); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:297:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (star->objname) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:326:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (star->objname) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:356:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (star->objname) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:582:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (star->objname) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:655:2: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (catpath, "/"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:693:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (catname) < 24) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:696:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (sc->isfil, catname, 23); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:725:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (header, sc->catbuff+2, lhead-2); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:729:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (header, sc->catbuff+1, lhead-1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:733:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (header, sc->catbuff, lhead); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:840:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (sc->isname, catdesc+2, ldesc-2); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:844:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (sc->isname, catdesc+1, ldesc-1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:848:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (sc->isname, catdesc, ldesc); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:1020:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (st->objname, token, 31); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:1165:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (st->objname, token, 31); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ctgread.c:1294:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (value) > 0) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fileutil.c:187:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lastchar = token + strlen (token) - 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:173:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). nbr = read (fd, fitsbuf, nbytes); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:207:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (headnext, fitsbuf, nbr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:234:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (pheader, header, lprim); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:311:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). nbr = read (fd, fitsbuf, nbytes); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:354:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy (header, "SIMPLE ", 8); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:372:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (headend, pheader, lprim); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:457:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). nbread = read (fd, imleft, nbleft); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:685:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lpnam[ifield] = strlen (pw[ifield].kname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:761:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). nbr = read (fd, tbuff, nbuff); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:774:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (line, tbuff, nbline); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:779:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (line, tbuff1, nbline); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:877:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (string, entry+kw->kf, length); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fitsfile.c:1220:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). nbr = read (fdin, image, nbbuff); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fortvimoswcs.c:328:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (coorsys, getvimoswcsout (vimoswcs), nc); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fortvimoswcs.c:376:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (coorsys, getvimoswcsin (vimoswcs), nc); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/fortvimoswcs.c:400:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (coorsys, getradecsys (vimoswcs), nc); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:115:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lval = strlen (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:117:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (val, value, VLENGTH); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:164:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lval = strlen (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:166:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (val, value, VLENGTH); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:211:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lval = strlen (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:213:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (val, value, VLENGTH); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:308:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lval = strlen (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:310:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (val, value, VLENGTH); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:347:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lval = strlen (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:349:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (val, value, VLENGTH); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:572:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lval = strlen (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:576:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (stri, value, lstri-1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:621:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lval = strlen (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:625:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (str, value, lstr-1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:658:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nchar = strlen (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:715:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (keyword,keyword0, sizeof(keyword)-1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:739:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (line,vpos,80); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:909:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lkey = strlen (keyword); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:998:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lhstr = strlen (hstring); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:1015:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lkey = strlen (keyword); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:1122:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (value) > 0) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:1146:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ls1 = strlen (s1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:1170:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ls2 = strlen (s2); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hget.c:1239:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lstr = strlen (string); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:149:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 0; i < strlen (value); i++) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:214:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy (value, "T"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:216:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy (value, "F"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:240:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lkw = strlen (keyword); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:249:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lroot = strlen (keyroot); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:259:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lcv = strlen (cval); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:261:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (newkey, "_"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:316:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lkeyword = strlen (keyword); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:322:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lcval = strlen (cval); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:328:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (&value[1],cval,lcval); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:365:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lkeyword = strlen (keyword); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:366:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lval = strlen (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:389:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (v2, v1, 80); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:395:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (v1,keyword,7); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:407:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (v1+9,value,lv1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:432:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (v2, ve, 80); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:442:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (line, v1, 80); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:458:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (newcom, c1+1, lcom); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:462:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lcom = strlen (newcom); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:475:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (v1, keyword, lkeyword); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:484:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (vp, value, lval); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:492:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (vp, value, lval); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:503:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (vp, newcom, lcom); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:537:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lkeyword = strlen (keyword); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:539:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lcom = strlen (comment); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:555:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (v2, v1, 80); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:560:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (v1, keyword, lkeyword); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:576:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (line, v1, 80); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:594:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy (c0, "/ ",2); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:602:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (c1, comment, lcom); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:639:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (v, v2, 80); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:680:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (v2, v, 80); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:684:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lkey = strlen (keyword); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:685:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (hplace, keyword, lkey); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:722:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lv2 = strlen (keyword2); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:867:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (tstring) < lstr-1) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:870:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (string, tstring, lstr-1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1009:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (tstring) < lstr-1) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1012:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (string, tstring, lstr-1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1061:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (tstring) < lstr-1) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/hput.c:1064:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (string, tstring, lstr-1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c:315:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lval = strlen (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c:319:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (str, value, lstr-1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/iget.c:449:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lkey = strlen (keyword); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:263:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (newpixname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:449:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. (void)strncpy (endline,"END", 3); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:493:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy (fitsheader, endline, 80); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:569:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((lstr = strlen (objname)) < 8) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:594:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (hdrname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:700:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy (fhead, fitsline, 80); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:712:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy (fhead, fitsline, 80); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:742:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy (fhead, fitsline, 80); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:753:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy (fhead, fitsline, 80); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:769:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy (fhead, endline, 80); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:777:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy (endline," ",3); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:779:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy (fp, endline,80); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:959:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy (newpixname, hdrname, SZ_IM2PIXFILE); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:962:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (newpixname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:977:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy (newpixname, hdrname, SZ_IM2PIXFILE); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:980:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (newpixname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:997:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy (newpixname, hdrname, SZ_IM2PIXFILE); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:998:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (newpixname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imhfile.c:1541:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nc = strlen (string); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imsetvimoswcs.c:163:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (matchcat) > 0) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imsetvimoswcs.c:480:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (imcatname) == 0) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imsetvimoswcs.c:599:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strlen (imcatname) == 0) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imsetvimoswcs.c:624:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strlen (imcatname) == 0) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imsetvimoswcs.c:640:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strlen (imcatname) == 0) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:284:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str = str + strlen (str) - 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:305:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lastchar = filename + strlen (filename) - 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:484:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (fname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:486:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lext = strlen (ext); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:487:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (newname, fname, lname - lext); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:504:6: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (newname, "_"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:510:6: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (newname, "m"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/imvimoswcs.c:512:6: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (newname, "r"); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/matchstar.c:517:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lastchar = nextline + strlen(nextline) - 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/slasubs.c:276:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen ( order ); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:242:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (star->objname) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:273:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (star->objname) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:305:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (star->objname) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:501:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (star->objname) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:697:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lval = strlen (value); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:749:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (tabname) < 24) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:752:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (sc->isfil, tabname, 23); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:765:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (sc->keyid, startab->colname[i], startab->lcol[i]); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:769:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (sc->keyid, startab->colname[i], startab->lcol[i]); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:773:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (sc->keyid, startab->colname[i], startab->lcol[i]); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:788:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (sc->keyra, startab->colname[i], startab->lcol[i]); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:802:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (sc->keydec, startab->colname[i], startab->lcol[i]); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:818:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (sc->keymag1, startab->colname[i], startab->lcol[i]); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:862:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (cstr) > 0) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:894:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (cstr) > 0) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:947:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (sc->keytype, startab->colname[i], startab->lcol[i]); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1040:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lnum = strlen (cstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1113:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lnum = strlen (cnum); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1252:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). taberr = (char *) calloc (64 + strlen (tabfile), 1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1261:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). taberr = (char *) calloc (64 + strlen (tabfile), 1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1272:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). taberr = (char *) calloc (64 + strlen (tabfile), 1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1282:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (tabfile) + 2; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1284:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). taberr = (char *) calloc (64 + strlen (tabfile), 1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1296:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). taberr = (char *) calloc (64 + strlen (tabfile), 1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1341:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (tabtable->tabname, thisname, nchar); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1345:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (tabname); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1376:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). taberr = (char *) calloc (64 + strlen (tabfile), 1); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1625:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (string, entry, ncstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1688:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lkey = strlen (keyword); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/tabread.c:1721:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (result, str0, ncstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:514:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lpath = strlen (str) + 16; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:519:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lpath = strlen (ty2cd) + 16; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:583:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tabpath = (char *) malloc (strlen (str) + 16); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:587:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tabpath = (char *) malloc (strlen (ty2cd) + 16); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:760:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lpath = strlen(str) + 18; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:765:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lpath = strlen(ty2cd) + 18; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:803:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (ty2file) < 24) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/ty2read.c:806:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (sc->isfil, ty2file, 23); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/uacread.c:948:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strlen (uapath) > 0) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:351:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy (ctype1, "XLON",4); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:461:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy (ctype2+1, "LAT",3); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:468:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy (ctype2+1, "LAT",3); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1431:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lcom = strlen (command); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1558:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (coorsys == NULL || strlen (coorsys) < 1 || data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1567:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(vimoswcs->radecout) - 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1570:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(vimoswcs->radecout) - 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1573:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(vimoswcs->radecout) - 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1584:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(vimoswcs->radecout) - 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1587:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(vimoswcs->radecout) - 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1590:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(vimoswcs->radecout) - 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1667:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (coorsys == NULL || strlen (coorsys) < 1) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1675:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(vimoswcs->radecin) - 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1678:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(vimoswcs->radecin) - 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1681:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(vimoswcs->radecin) - 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1692:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(vimoswcs->radecin) - 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1695:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(vimoswcs->radecin) - 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1698:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(vimoswcs->radecin) - 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1842:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy (vimoswcstring,"********* **********",lstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1844:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy (vimoswcstring,"*******************",lstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1869:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy (vimoswcstring,"************* *************",lstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1871:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy (vimoswcstring,"**************************",lstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1934:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (lstr > strlen(vimoswcs->radecout)+1 && vimoswcs->printsys) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1936:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (vimoswcstring," "); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1938:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (vimoswcstring," "); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1947:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lstring = strlen (rastr) + strlen (decstr) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1947:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lstring = strlen (rastr) + strlen (decstr) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1948:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lunits = strlen (vimoswcs->units[0]) + strlen (vimoswcs->units[1]) + 2; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1948:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lunits = strlen (vimoswcs->units[0]) + strlen (vimoswcs->units[1]) + 2; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1951:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (vimoswcs->units[0]) > 0) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1952:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (rastr, " "); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1955:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (vimoswcs->units[1]) > 0) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1956:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (decstr, " "); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1970:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy (vimoswcstring,"********** *********",lstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1972:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy (vimoswcstring,"*******************",lstr); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1979:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (vimoswcs->units[0]) > 0) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1980:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (vimoswcstring, " "); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1983:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (vimoswcs->units[1]) > 0) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:1984:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (vimoswcstring, " "); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:2338:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { if (strlen (filename) < 256) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:2341:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (vimoswcsfile, filename, 255); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:2353:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { if (strlen (vimoswcsfile) > 0) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcs.c:2394:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lcom = strlen (vimoswcscomm) + 2; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsfort.c:328:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (coorsys, getvimoswcsout (vimoswcs), nc); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsfort.c:376:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (coorsys, getvimoswcsin (vimoswcs), nc); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsfort.c:400:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (coorsys, getradecsys (vimoswcs), nc); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:103:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (upname) == 1) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:133:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lstring = strlen (string); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:296:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy (vimoswcs->ctype[2], ""); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:299:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy (vimoswcs->ctype[3], ""); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit.c:819:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (vimoswcs->radecsys) == 0 || vimoswcs->prjcode == VIMOSWCS_LIN) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:134:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy (vimoswcs->ctype[2], ""); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:136:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy (vimoswcs->ctype[3], ""); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit0.c:629:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (vimoswcs->radecsys) == 0 || vimoswcs->prjcode == VIMOSWCS_LIN) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:134:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy (vimoswcs->ctype[2], ""); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:136:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy (vimoswcs->ctype[3], ""); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinit1.c:629:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (vimoswcs->radecsys) == 0 || vimoswcs->prjcode == VIMOSWCS_LIN) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:105:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (upname) == 1) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:135:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lstring = strlen (string); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:296:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy (vimoswcs->ctype[2], ""); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:299:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy (vimoswcs->ctype[3], ""); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcsinitm.c:818:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (vimoswcs->radecsys) == 0 || vimoswcs->prjcode == VIMOSWCS_LIN) data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c:428:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(vimoswcs->pcode, ""); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c:429:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(requir, ""); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/vimoswcslib.c:496:10: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(requir, ""); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:91:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lurl = strlen (caturl); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:183:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (tabtable->tabdata == NULL || strlen (tabtable->tabdata) == 0) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:243:6: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (numlist, ","); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:266:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (tabtable->tabdata == NULL || strlen (tabtable->tabdata) == 0) { data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:325:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (server, servurl, lserver); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:329:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lsrch = strlen (srchpar) + strlen (cgipart) + 2; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:329:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lsrch = strlen (srchpar) + strlen (cgipart) + 2; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:373:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lline = strlen (linebuff); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:380:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lline = strlen (linebuff); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:413:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nc = nc + strlen (linebuff); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:415:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lbuff = 100 * strlen (linebuff); data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:447:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (caturl) + 2; data/cpl-plugin-vimos-4.1.1+dfsg/external/libwcs/webread.c:457:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lname = strlen (srchpar) + 2; data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_framelist.c:1171:17: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cpl_boolean equal; data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_framelist.c:1193:14: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (!equal) { data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_framelist.c:1205:14: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (!equal) { data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_framelist.c:1217:14: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (!equal) { data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_framelist.c:1229:14: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (!equal) { data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_framelist.c:1241:14: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (!equal) { data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_framelist.c:1253:14: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (!equal) { data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_framelist.c:1264:14: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (!equal) { data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_framelist.c:1279:10: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (!equal) { data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_framelist.c:1284:12: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. return equal; data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_sdp_spectrum.c:923:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t n1 = strlen(va[i]); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_sdp_spectrum.c:924:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t n2 = strlen(vb[i]); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_sdp_spectrum.c:1283:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t keylen = strlen(keyword_table[mid].name); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_sdp_spectrum.c:1302:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(record->name) != strlen(name)) { data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_sdp_spectrum.c:1302:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(record->name) != strlen(name)) { data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_sdp_spectrum.c:1306:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char *c = name + strlen(record->name); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_sdp_spectrum.c:2621:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cpl_size extra_length = (extra != NULL ? (cpl_size) strlen(extra) : 0); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_sdp_spectrum.c:2655:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_length = (cpl_size) strlen(name); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_sdp_spectrum.c:2659:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fragment_length = (cpl_size) strlen(fragment); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_sdp_spectrum.c:2673:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(writepos, fragment, bytesleft); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_sdp_spectrum.c:2676:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(writepos, name, bytesleft); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_sdp_spectrum.c:2683:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(writepos, join_fragment, bytesleft); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_sdp_spectrum.c:2684:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bytesleft -= (cpl_size) strlen(join_fragment); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_sdp_spectrum.c:2685:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). writepos += (cpl_size) strlen(join_fragment); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_sdp_spectrum.c:2686:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(writepos, extra, bytesleft); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/irplib_sdp_spectrum.c:2690:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(writepos, end_fragment, bytesleft); data/cpl-plugin-vimos-4.1.1+dfsg/irplib/tests/irplib_utils-test.c:177:21: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. cpl_test_assert(sscanf(line, "%31s %16lf", &str[0], &val) != EOF); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/dict.c:1236:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int sz = strlen(str) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/hash.c:882:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int sz = strlen(str) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/kazlib/list.c:817:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int sz = strlen(str) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.c:234:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). # if (!defined __STDC__ || !__STDC__) && !defined strlen data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.c:237:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extern int strlen (const char *); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.c:428:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = nonoption_flags_max_len = strlen (orig_str); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.c:656:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). == (unsigned int) strlen (p->name)) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.c:683:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nextchar += strlen (nextchar); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.c:715:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nextchar += strlen (nextchar); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.c:731:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nextchar += strlen (nextchar); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.c:736:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nextchar += strlen (nextchar); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.c:847:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((unsigned int) (nameend - nextchar) == strlen (p->name)) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.c:870:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nextchar += strlen (nextchar); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.c:890:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nextchar += strlen (nextchar); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.c:904:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nextchar += strlen (nextchar); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/getopt.c:908:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nextchar += strlen (nextchar); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcdb.c:121:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!name || strlen(name) == 0) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcdb.c:399:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t sz = strlen(value); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcdb.c:402:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (sz++ > strlen(db_value->value)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcdb.c:828:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). parString[count] = (char *)pil_calloc(strlen(db_key) + 5, sizeof(char)); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcdb.c:835:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). parString[count] = (char *)pil_calloc(strlen(db_key) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcdb.c:836:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(db_data->value) + 5, data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcdb.c:841:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). parString[count] = (char *)pil_calloc(strlen(db_key) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilcdb.c:842:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(db_data->value) + 2, data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:150:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (sz != strlen(path)) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:198:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!s || *(s + strlen(instrument)) != '\0') { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:199:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(root); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:203:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz += strlen(instrument) + 2; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:212:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy(s, instrument, strlen(instrument) + 1); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pildfsconfig.c:705:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (filename && strlen(filename) > 0) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:98:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p += strlen(path) - 1; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:160:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(src) > PIL_PATHNAME_MAX) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:163:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(spath, src, PIL_PATHNAME_MAX); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:171:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(tpath, "/"); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:177:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(tpath, "/"); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:188:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(tpath); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:193:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(tpath); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:197:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz += strlen(s) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:203:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(tpath, "/"); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:223:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(tpath) > PIL_PATHNAME_MAX) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:226:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dest, tpath, PIL_PATHNAME_MAX); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:404:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(filename) > PIL_PATHNAME_MAX) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:407:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tfile, filename, PIL_PATHNAME_MAX); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:422:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(basename, s + 1, PIL_PATHNAME_MAX); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:424:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(basename, tfile, PIL_PATHNAME_MAX); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:470:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dirname, filename, sz); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:537:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(pwordexp.we_wordv[0]) > PIL_PATHNAME_MAX) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:541:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tpath, pwordexp.we_wordv[0], PIL_PATHNAME_MAX); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilfileutils.c:583:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (*(filepath + strlen(filepath) - 1) == '/') data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilframe.c:266:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((length = strlen(filename)) > PIL_PATHNAME_MAX) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilframe.c:269:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (length++ > strlen(frame->filename)) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:356:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). startTerminalLine = strlen(messageTerminal); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:371:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(messageLog, " "); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:372:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(messageTerminal, " "); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:764:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) >= MAX_RECIPE_NAME) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilmessages.c:765:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(recipeName, name, MAX_RECIPE_NAME); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:137:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = (strlen((char *)value) + 1) * sizeof(char); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:629:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(record->name) + 1 > PAF_RECORD_MAX) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:637:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(record->name); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:638:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buffer, record->name, sz); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:664:25: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(value, "."); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:682:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(value); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:691:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(&buffer[pos], value, sz); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:710:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(&buffer[pos], "# ", 2); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:712:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(record->comment); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:713:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(&buffer[pos], record->comment, sz); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:1210:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(name); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:1607:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t sz = strlen(comment); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilpaf.c:1609:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (sz != strlen(record->comment)) { data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c:187:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen(INSTRUMENT) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c:192:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length += strlen(comment) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c:234:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen(INSTRUMENT) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c:239:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length += strlen(comment) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c:242:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length += strlen(unit) + 3; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c:283:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen(INSTRUMENT) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c:288:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length += strlen(comment) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilqc.c:291:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length += strlen(unit) + 3; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:287:20: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((rbytes = read(src, buf, blksize)) > 0) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:422:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(group, name, sz); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:593:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(common_options[i++].opt.name); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:600:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(parg[i++].name); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:911:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name = name + strlen(group) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1009:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(path) + strlen(prefix); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1009:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(path) + strlen(prefix); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1039:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(path) + strlen(pilRecGetName()); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1039:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(path) + strlen(pilRecGetName()); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1056:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(path) + strlen(pilFrmGetCategory(frame)); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1056:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(path) + strlen(pilFrmGetCategory(frame)); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1059:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(category, pilFrmGetCategory(frame), PIL_CATEGORY_MAX); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1074:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(name); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1079:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (sz + strlen(".fits") <= PIL_PATHNAME_MAX) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1095:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (sz + strlen(".paf") <= PIL_PATHNAME_MAX) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilrecipe.c:1769:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name = name + strlen(group) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilstrutils.c:84:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(string) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltask.c:200:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (argc < 1 || !argv || !argv[0] || strlen(argv[0]) > PIL_PATHNAME_MAX) data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:1143:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(p); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/piltranslator.c:1249:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(p); data/cpl-plugin-vimos-4.1.1+dfsg/libpil/pil/pilutils.c:145:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). t = s + strlen(s) - 1; data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_imagelist_io.c:489:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const int msgmin = (int)strlen(msg) - 5; data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_imagelist_io.c:502:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const int imsgmin = (int)strlen(imsg) - 5; data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_imagelist_io.c:548:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const int imsgmin = (int)strlen(imsg) - 5; data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_utils.c:346:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char * sep = strlen(prefix) > 0 ? "." : ""; data/cpl-plugin-vimos-4.1.1+dfsg/mosca/hdrl/hdrl_utils.c:391:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (val == NULL || strlen(val) == 0) { data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_fringe.c:827:19: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. (void)strncpy(filter,"unknown",16); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_fringe.c:829:19: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. (void)strncpy(dateobs,"1900-01-01T00:00:00.000",32); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_fringe.c:837:15: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. (void)strcpy(outfname,""); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:1078:17: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pcat,cpl_propertylist_get_string(pp,"EXTNAME"),32); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:1087:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pcat,cpl_propertylist_get_string(pp,"PHOTCAT"),32); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:1091:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pcat,junk1,32); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:1122:21: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(photosys,cpl_propertylist_get_string(pp,"PHOTOSYS"),8); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_science.c:2793:15: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. (void)strcpy(outfname,""); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:943:17: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(photosys,cpl_propertylist_get_string(pp,"PHOTOSYS"),8); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vimos_ima_standard.c:1829:15: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. (void)strcpy(outfname,""); data/cpl-plugin-vimos-4.1.1+dfsg/recipes/vmifucombinecube.cc:509:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tplStart, astart, 24); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/moses.c:19570:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nbands = strlen(bands); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:337:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *filename = cpl_calloc(strlen(category) + 6, sizeof(char)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:1080:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filename = cpl_calloc(strlen(category) + 6, sizeof(char)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:1255:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filename = cpl_calloc(strlen(category) + 6, sizeof(char)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:1513:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char * filename = cpl_calloc(strlen(tag) + 6, sizeof(char)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:1552:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char * filename = cpl_calloc(strlen(tag) + 6, sizeof(char)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vimos_dfs.c:1604:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char * filename = cpl_calloc(strlen(tag) + 6, sizeof(char)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmccdtable.c:66:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(currentColumn->colName,"X"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmccdtable.c:71:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(currentColumn->colName,"Y"); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmcpl.c:443:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). group = context + strlen("vimos."); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmfit.c:686:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 0; i < (int)strlen(s); i++) { data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmfit.c:1074:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pos += strlen(pos); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimage.c:189:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen(name) == 0 ) { data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimage.c:201:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(comment1); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimageset.c:305:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nChar = strlen(inImaName); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.c:918:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = sizeof(char) * (strlen(namePAF)+7); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmimgutils.c:1197:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = sizeof(char) * (strlen(namePAF)+7); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.c:1701:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = sizeof(char) * (strlen(namePAF)+7); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.c:1898:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = sizeof(char) * (strlen(namePAF)+7); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmmosutils.c:2047:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(filename) + 1; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmqcutils.c:983:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). descName = cpl_malloc((strlen(name) + 5) * sizeof(char *)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmqcutils.c:1056:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). descName = cpl_malloc((strlen(name) + 5) * sizeof(char *)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmqcutils.c:1134:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). descName = cpl_malloc((strlen(name) + 15) * sizeof(char *)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmqcutils.c:1218:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). descName = cpl_malloc((strlen(name) + 15) * sizeof(char *)); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:140:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(newDesc->descComment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:241:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(value); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:652:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tDesc->len = strlen(value); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1032:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nchar = strlen(str); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1045:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((pos+strlen(pos)) == (descName+nchar)) delDesc = currDesc; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1640:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nchar = strlen(name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1673:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((pos + strlen(pos)) == (descName + nchar)) { data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1731:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1742:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1767:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1795:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1806:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1831:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1859:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1874:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1902:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1930:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1941:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1966:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1992:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(val, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:1995:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2003:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(val, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2006:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2028:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(val, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2031:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2082:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2093:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2127:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2156:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2167:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2201:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2231:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2242:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2276:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(comment, ""); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:2665:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((sz = strlen(name)) > VM_DESC_LENGTH - 1) data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:3206:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((sz = strlen(name)) > VM_DESC_LENGTH - 1) { data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:3429:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen(name) == 0 ) { data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmtable.c:3697:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(stArray[i])+1; data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:137:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nBlanks = PAF_VALUE_POSITION - strlen(name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:175:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nBlanks = PAF_VALUE_POSITION - strlen(name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmutils.c:211:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nBlanks = PAF_VALUE_POSITION - strlen(name); data/cpl-plugin-vimos-4.1.1+dfsg/vimos/vmwcsutils.c:853:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (wcs->radecsys) == 0 || wcs->prjcode == VIMOSWCS_LIN) ANALYSIS SUMMARY: Hits = 2786 Lines analyzed = 330200 in approximately 8.56 seconds (38583 lines/second) Physical Source Lines of Code (SLOC) = 186089 Hits@level = [0] 1193 [1] 513 [2] 1583 [3] 67 [4] 603 [5] 20 Hits@level+ = [0+] 3979 [1+] 2786 [2+] 2273 [3+] 690 [4+] 623 [5+] 20 Hits/KSLOC@level+ = [0+] 21.3822 [1+] 14.9713 [2+] 12.2146 [3+] 3.7079 [4+] 3.34786 [5+] 0.107475 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.