Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/wlma.h
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/topLevelShell1.h
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/topLevelShell1.c
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/support.c
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/format.h
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/format.c
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/demonstrationForm.h
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/demonstrationForm.c
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.h
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/WorkingDialog.h
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/UxXt.h
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/UxXt.c
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/UxMethod.c
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/SutProto.h
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/SutList.h
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/Sut.h
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/SaPopCalls.h
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/SaConsoleCalls.h
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/SaAddLogin.h
Examining data/ctn-3.2.0~dfsg/apps/wlma_ui/wlma_ui.c
Examining data/ctn-3.2.0~dfsg/apps/tbltest/ttupdate.c
Examining data/ctn-3.2.0~dfsg/apps/tbltest/ttunique.c
Examining data/ctn-3.2.0~dfsg/apps/tbltest/ttselect.c
Examining data/ctn-3.2.0~dfsg/apps/tbltest/ttlayout.c
Examining data/ctn-3.2.0~dfsg/apps/tbltest/ttinsert.c
Examining data/ctn-3.2.0~dfsg/apps/tbltest/ttdelete.c
Examining data/ctn-3.2.0~dfsg/apps/tbltest/tbltest.c
Examining data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.h
Examining data/ctn-3.2.0~dfsg/apps/storage_commit/sscond.c
Examining data/ctn-3.2.0~dfsg/apps/storage_commit/requests.c
Examining data/ctn-3.2.0~dfsg/apps/storage_commit/nevent.h
Examining data/ctn-3.2.0~dfsg/apps/storage_commit/commit_request.c
Examining data/ctn-3.2.0~dfsg/apps/storage_commit/association.c
Examining data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c
Examining data/ctn-3.2.0~dfsg/apps/storage_commit/nevent.c
Examining data/ctn-3.2.0~dfsg/apps/storage_commit/commit_agent.c
Examining data/ctn-3.2.0~dfsg/apps/storage_classes/storage_classes.c
Examining data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c
Examining data/ctn-3.2.0~dfsg/apps/snp_to_files/snp_to_files.c
Examining data/ctn-3.2.0~dfsg/apps/simple_storage/sscond.c
Examining data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.h
Examining data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c
Examining data/ctn-3.2.0~dfsg/apps/simple_pacs/sscond.c
Examining data/ctn-3.2.0~dfsg/apps/simple_pacs/simple_pacs.h
Examining data/ctn-3.2.0~dfsg/apps/simple_pacs/simple_pacs.c
Examining data/ctn-3.2.0~dfsg/apps/send_study/send_study.h
Examining data/ctn-3.2.0~dfsg/apps/send_study/association.c
Examining data/ctn-3.2.0~dfsg/apps/send_study/send_study.c
Examining data/ctn-3.2.0~dfsg/apps/send_results/send_results.h
Examining data/ctn-3.2.0~dfsg/apps/send_results/association.c
Examining data/ctn-3.2.0~dfsg/apps/send_results/send_results.c
Examining data/ctn-3.2.0~dfsg/apps/send_image/send_image.c
Examining data/ctn-3.2.0~dfsg/apps/rsa_ui/support.c
Examining data/ctn-3.2.0~dfsg/apps/rsa_ui/rsa.h
Examining data/ctn-3.2.0~dfsg/apps/rsa_ui/format.h
Examining data/ctn-3.2.0~dfsg/apps/rsa_ui/format.c
Examining data/ctn-3.2.0~dfsg/apps/rsa_ui/applicationShell1.h
Examining data/ctn-3.2.0~dfsg/apps/rsa_ui/applicationShell1.c
Examining data/ctn-3.2.0~dfsg/apps/rsa_ui/WorkingDialog.h
Examining data/ctn-3.2.0~dfsg/apps/rsa_ui/UxXt.h
Examining data/ctn-3.2.0~dfsg/apps/rsa_ui/UxXt.c
Examining data/ctn-3.2.0~dfsg/apps/rsa_ui/UxMethod.c
Examining data/ctn-3.2.0~dfsg/apps/rsa_ui/SutProto.h
Examining data/ctn-3.2.0~dfsg/apps/rsa_ui/SutList.h
Examining data/ctn-3.2.0~dfsg/apps/rsa_ui/Sut.h
Examining data/ctn-3.2.0~dfsg/apps/rsa_ui/SaPopCalls.h
Examining data/ctn-3.2.0~dfsg/apps/rsa_ui/SaConsoleCalls.h
Examining data/ctn-3.2.0~dfsg/apps/rsa_ui/SaAddLogin.h
Examining data/ctn-3.2.0~dfsg/apps/rsa_ui/rsa_ui.c
Examining data/ctn-3.2.0~dfsg/apps/ris_gateway/sscond.c
Examining data/ctn-3.2.0~dfsg/apps/ris_gateway/ris_gateway.h
Examining data/ctn-3.2.0~dfsg/apps/ris_gateway/requests.c
Examining data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c
Examining data/ctn-3.2.0~dfsg/apps/ris_gateway/event.c
Examining data/ctn-3.2.0~dfsg/apps/ris_gateway/association.c
Examining data/ctn-3.2.0~dfsg/apps/ris_gateway/ris_gateway.c
Examining data/ctn-3.2.0~dfsg/apps/query_client/topLevelShell1.h
Examining data/ctn-3.2.0~dfsg/apps/query_client/topLevelShell1.c
Examining data/ctn-3.2.0~dfsg/apps/query_client/stdafx.h
Examining data/ctn-3.2.0~dfsg/apps/query_client/stdafx.cpp
Examining data/ctn-3.2.0~dfsg/apps/query_client/resource.h
Examining data/ctn-3.2.0~dfsg/apps/query_client/query_interface.h
Examining data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c
Examining data/ctn-3.2.0~dfsg/apps/query_client/query_clientdlg.h
Examining data/ctn-3.2.0~dfsg/apps/query_client/query_clientdlg.cpp
Examining data/ctn-3.2.0~dfsg/apps/query_client/query_client.h
Examining data/ctn-3.2.0~dfsg/apps/query_client/query_client.cpp
Examining data/ctn-3.2.0~dfsg/apps/query_client/query_client.c
Examining data/ctn-3.2.0~dfsg/apps/query_client/menu_windows.h
Examining data/ctn-3.2.0~dfsg/apps/query_client/format.h
Examining data/ctn-3.2.0~dfsg/apps/query_client/format.c
Examining data/ctn-3.2.0~dfsg/apps/query_client/WorkingDialog.h
Examining data/ctn-3.2.0~dfsg/apps/query_client/UxXt.h
Examining data/ctn-3.2.0~dfsg/apps/query_client/UxXt.c
Examining data/ctn-3.2.0~dfsg/apps/query_client/UxMethod.c
Examining data/ctn-3.2.0~dfsg/apps/query_client/SutProto.h
Examining data/ctn-3.2.0~dfsg/apps/query_client/SutList.h
Examining data/ctn-3.2.0~dfsg/apps/query_client/Sut.h
Examining data/ctn-3.2.0~dfsg/apps/query_client/SaPopCalls.h
Examining data/ctn-3.2.0~dfsg/apps/query_client/SaConsoleCalls.h
Examining data/ctn-3.2.0~dfsg/apps/query_client/SaAddLogin.h
Examining data/ctn-3.2.0~dfsg/apps/query_client/patient_query.c
Examining data/ctn-3.2.0~dfsg/apps/print_server_display/print_server_display.c
Examining data/ctn-3.2.0~dfsg/apps/print_server_display/display_prn.h
Examining data/ctn-3.2.0~dfsg/apps/print_server_display/display_prn.c
Examining data/ctn-3.2.0~dfsg/apps/print_server/verify.c
Examining data/ctn-3.2.0~dfsg/apps/print_server/utils.c
Examining data/ctn-3.2.0~dfsg/apps/print_server/static_variables.h
Examining data/ctn-3.2.0~dfsg/apps/print_server/sscond.c
Examining data/ctn-3.2.0~dfsg/apps/print_server/set.c
Examining data/ctn-3.2.0~dfsg/apps/print_server/requests.c
Examining data/ctn-3.2.0~dfsg/apps/print_server/psscond.c
Examining data/ctn-3.2.0~dfsg/apps/print_server/private.h
Examining data/ctn-3.2.0~dfsg/apps/print_server/print_server.h
Examining data/ctn-3.2.0~dfsg/apps/print_server/prequests.c
Examining data/ctn-3.2.0~dfsg/apps/print_server/passociation.c
Examining data/ctn-3.2.0~dfsg/apps/print_server/get.c
Examining data/ctn-3.2.0~dfsg/apps/print_server/delete.c
Examining data/ctn-3.2.0~dfsg/apps/print_server/create.c
Examining data/ctn-3.2.0~dfsg/apps/print_server/association.c
Examining data/ctn-3.2.0~dfsg/apps/print_server/action.c
Examining data/ctn-3.2.0~dfsg/apps/print_server/print_server.c
Examining data/ctn-3.2.0~dfsg/apps/print_clients/test.c
Examining data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.h
Examining data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c
Examining data/ctn-3.2.0~dfsg/apps/print_clients/print_query.c
Examining data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr_private.h
Examining data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr_private.c
Examining data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.h
Examining data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c
Examining data/ctn-3.2.0~dfsg/apps/print_clients/print_client_private.h
Examining data/ctn-3.2.0~dfsg/apps/print_clients/print_client_private.c
Examining data/ctn-3.2.0~dfsg/apps/print_clients/print_client_app.h
Examining data/ctn-3.2.0~dfsg/apps/print_clients/print_client.h
Examining data/ctn-3.2.0~dfsg/apps/print_clients/print_callback.h
Examining data/ctn-3.2.0~dfsg/apps/print_clients/print_callback.c
Examining data/ctn-3.2.0~dfsg/apps/print_clients/display_study.h
Examining data/ctn-3.2.0~dfsg/apps/print_clients/display_study.c
Examining data/ctn-3.2.0~dfsg/apps/print_clients/display_message.h
Examining data/ctn-3.2.0~dfsg/apps/print_clients/display_message.c
Examining data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.h
Examining data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.c
Examining data/ctn-3.2.0~dfsg/apps/print_clients/display_error.h
Examining data/ctn-3.2.0~dfsg/apps/print_clients/display_error.c
Examining data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c
Examining data/ctn-3.2.0~dfsg/apps/print_clients/MessageBox.h
Examining data/ctn-3.2.0~dfsg/apps/print_clients/MessageBox.c
Examining data/ctn-3.2.0~dfsg/apps/print_clients/Fields.h
Examining data/ctn-3.2.0~dfsg/apps/print_clients/Fields.c
Examining data/ctn-3.2.0~dfsg/apps/print_clients/Buttons.h
Examining data/ctn-3.2.0~dfsg/apps/print_clients/Buttons.c
Examining data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/studyListForm.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/studyListForm.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/selectPrinterDialog.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/selectPrinterDialog.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_client_app.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/previewStudyForm.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/previewStudyForm.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/get_patientList.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/format.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/format.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmInformationForm.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmInformationForm.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/driver.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/display.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/association.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/association.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/applicationShell1.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/applicationShell1.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/WorkingDialog.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/UxXt.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/UxXt.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/UxMethod.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/SutProto.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/SutList.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/Sut.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/SaPopCalls.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/SaConsoleCalls.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/SaAddLogin.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/PrintMessage.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/PrintMessage.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/MultipleSelection.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/MultipleSelection.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/ImageAttribute.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/ImageAttribute.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/BasicFilmBox_Standard.h
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/BasicFilmBox_Standard.c
Examining data/ctn-3.2.0~dfsg/apps/pmgr_motif/pmgr_motif.c
Examining data/ctn-3.2.0~dfsg/apps/pdu_examples/ex4_cond.c
Examining data/ctn-3.2.0~dfsg/apps/pdu_examples/ex4_acceptor.h
Examining data/ctn-3.2.0~dfsg/apps/pdu_examples/ex3_cond.c
Examining data/ctn-3.2.0~dfsg/apps/pdu_examples/ex3_acceptor.h
Examining data/ctn-3.2.0~dfsg/apps/pdu_examples/ex3_initiator.c
Examining data/ctn-3.2.0~dfsg/apps/pdu_examples/ex3_acceptor.c
Examining data/ctn-3.2.0~dfsg/apps/pdu_examples/ex1_initiator.c
Examining data/ctn-3.2.0~dfsg/apps/pdu_examples/ex4_initiator.c
Examining data/ctn-3.2.0~dfsg/apps/pdu_examples/ex2_initiator.c
Examining data/ctn-3.2.0~dfsg/apps/pdu_examples/ex4_acceptor.c
Examining data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.h
Examining data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c
Examining data/ctn-3.2.0~dfsg/apps/object_viewer/object_viewer.c
Examining data/ctn-3.2.0~dfsg/apps/object_viewer/format.h
Examining data/ctn-3.2.0~dfsg/apps/object_viewer/format.c
Examining data/ctn-3.2.0~dfsg/apps/object_viewer/fileSelectionBoxDialog1.h
Examining data/ctn-3.2.0~dfsg/apps/object_viewer/fileSelectionBoxDialog1.c
Examining data/ctn-3.2.0~dfsg/apps/object_viewer/WorkingDialog.h
Examining data/ctn-3.2.0~dfsg/apps/object_viewer/UxXt.h
Examining data/ctn-3.2.0~dfsg/apps/object_viewer/UxXt.c
Examining data/ctn-3.2.0~dfsg/apps/object_viewer/UxMethod.c
Examining data/ctn-3.2.0~dfsg/apps/object_viewer/SutProto.h
Examining data/ctn-3.2.0~dfsg/apps/object_viewer/SutList.h
Examining data/ctn-3.2.0~dfsg/apps/object_viewer/Sut.h
Examining data/ctn-3.2.0~dfsg/apps/object_viewer/SaPopCalls.h
Examining data/ctn-3.2.0~dfsg/apps/object_viewer/SaConsoleCalls.h
Examining data/ctn-3.2.0~dfsg/apps/object_viewer/SaAddLogin.h
Examining data/ctn-3.2.0~dfsg/apps/new_uids/new_uids.c
Examining data/ctn-3.2.0~dfsg/apps/mwlQuery/mwlQuery.c
Examining data/ctn-3.2.0~dfsg/apps/mb_xlate_test/mb_xlate_test.c
Examining data/ctn-3.2.0~dfsg/apps/mb_query/mb_query.c
Examining data/ctn-3.2.0~dfsg/apps/load_control/load_control.c
Examining data/ctn-3.2.0~dfsg/apps/image_server/sscond.c
Examining data/ctn-3.2.0~dfsg/apps/image_server/requests.c
Examining data/ctn-3.2.0~dfsg/apps/image_server/parse.c
Examining data/ctn-3.2.0~dfsg/apps/image_server/move.h
Examining data/ctn-3.2.0~dfsg/apps/image_server/move.c
Examining data/ctn-3.2.0~dfsg/apps/image_server/image_server.h
Examining data/ctn-3.2.0~dfsg/apps/image_server/find.h
Examining data/ctn-3.2.0~dfsg/apps/image_server/find.c
Examining data/ctn-3.2.0~dfsg/apps/image_server/copy.h
Examining data/ctn-3.2.0~dfsg/apps/image_server/copy.c
Examining data/ctn-3.2.0~dfsg/apps/image_server/cget.h
Examining data/ctn-3.2.0~dfsg/apps/image_server/cget.c
Examining data/ctn-3.2.0~dfsg/apps/image_server/association.c
Examining data/ctn-3.2.0~dfsg/apps/image_server/test_storage.c
Examining data/ctn-3.2.0~dfsg/apps/image_server/image_server.c
Examining data/ctn-3.2.0~dfsg/apps/image_server/fillImageDB.c
Examining data/ctn-3.2.0~dfsg/apps/image_archive/sscond.c
Examining data/ctn-3.2.0~dfsg/apps/image_archive/requests_dummy.c
Examining data/ctn-3.2.0~dfsg/apps/image_archive/requests.c
Examining data/ctn-3.2.0~dfsg/apps/image_archive/parseMB.c
Examining data/ctn-3.2.0~dfsg/apps/image_archive/parse.c
Examining data/ctn-3.2.0~dfsg/apps/image_archive/naction.h
Examining data/ctn-3.2.0~dfsg/apps/image_archive/naction.c
Examining data/ctn-3.2.0~dfsg/apps/image_archive/move.h
Examining data/ctn-3.2.0~dfsg/apps/image_archive/move.c
Examining data/ctn-3.2.0~dfsg/apps/image_archive/image_archive.h
Examining data/ctn-3.2.0~dfsg/apps/image_archive/find.h
Examining data/ctn-3.2.0~dfsg/apps/image_archive/find.c
Examining data/ctn-3.2.0~dfsg/apps/image_archive/copy.h
Examining data/ctn-3.2.0~dfsg/apps/image_archive/copy.c
Examining data/ctn-3.2.0~dfsg/apps/image_archive/commit_result.h
Examining data/ctn-3.2.0~dfsg/apps/image_archive/commit_result.c
Examining data/ctn-3.2.0~dfsg/apps/image_archive/cget.h
Examining data/ctn-3.2.0~dfsg/apps/image_archive/cget.c
Examining data/ctn-3.2.0~dfsg/apps/image_archive/association_dummy.c
Examining data/ctn-3.2.0~dfsg/apps/image_archive/association.c
Examining data/ctn-3.2.0~dfsg/apps/image_archive/archive_queue.h
Examining data/ctn-3.2.0~dfsg/apps/image_archive/archive_agent.c
Examining data/ctn-3.2.0~dfsg/apps/image_archive/dump_commit_requests.c
Examining data/ctn-3.2.0~dfsg/apps/image_archive/archive_cleaner.c
Examining data/ctn-3.2.0~dfsg/apps/image_archive/queue.c
Examining data/ctn-3.2.0~dfsg/apps/image_archive/archive_server.c
Examining data/ctn-3.2.0~dfsg/apps/idb_viewer/idb_viewer.h
Examining data/ctn-3.2.0~dfsg/apps/idb_viewer/format.h
Examining data/ctn-3.2.0~dfsg/apps/idb_viewer/format.c
Examining data/ctn-3.2.0~dfsg/apps/idb_viewer/applicationShell1.h
Examining data/ctn-3.2.0~dfsg/apps/idb_viewer/applicationShell1.c
Examining data/ctn-3.2.0~dfsg/apps/idb_viewer/WorkingDialog.h
Examining data/ctn-3.2.0~dfsg/apps/idb_viewer/UxXt.h
Examining data/ctn-3.2.0~dfsg/apps/idb_viewer/UxXt.c
Examining data/ctn-3.2.0~dfsg/apps/idb_viewer/UxMethod.c
Examining data/ctn-3.2.0~dfsg/apps/idb_viewer/SutProto.h
Examining data/ctn-3.2.0~dfsg/apps/idb_viewer/SutList.h
Examining data/ctn-3.2.0~dfsg/apps/idb_viewer/Sut.h
Examining data/ctn-3.2.0~dfsg/apps/idb_viewer/SaPopCalls.h
Examining data/ctn-3.2.0~dfsg/apps/idb_viewer/SaConsoleCalls.h
Examining data/ctn-3.2.0~dfsg/apps/idb_viewer/SaAddLogin.h
Examining data/ctn-3.2.0~dfsg/apps/idb_viewer/idb_viewer.c
Examining data/ctn-3.2.0~dfsg/apps/idb_dump/idb_dump.c
Examining data/ctn-3.2.0~dfsg/apps/icon/icon_dump_index.c
Examining data/ctn-3.2.0~dfsg/apps/icon/icon_dump_file.c
Examining data/ctn-3.2.0~dfsg/apps/icon/icon_append_index.c
Examining data/ctn-3.2.0~dfsg/apps/icon/icon_append_file.c
Examining data/ctn-3.2.0~dfsg/apps/icon/create_print_entry.c
Examining data/ctn-3.2.0~dfsg/apps/icon/create_db_entry.c
Examining data/ctn-3.2.0~dfsg/apps/gq/gqtest.c
Examining data/ctn-3.2.0~dfsg/apps/gq/gqkillq.c
Examining data/ctn-3.2.0~dfsg/apps/gq/gqinitq.c
Examining data/ctn-3.2.0~dfsg/apps/fis_server/wlma_server.h
Examining data/ctn-3.2.0~dfsg/apps/fis_server/sscond.c
Examining data/ctn-3.2.0~dfsg/apps/fis_server/services.h
Examining data/ctn-3.2.0~dfsg/apps/fis_server/requests.c
Examining data/ctn-3.2.0~dfsg/apps/fis_server/nset.c
Examining data/ctn-3.2.0~dfsg/apps/fis_server/nget.c
Examining data/ctn-3.2.0~dfsg/apps/fis_server/ncreate.c
Examining data/ctn-3.2.0~dfsg/apps/fis_server/fis_server.h
Examining data/ctn-3.2.0~dfsg/apps/fis_server/association.c
Examining data/ctn-3.2.0~dfsg/apps/fis_server/fis_server.c
Examining data/ctn-3.2.0~dfsg/apps/fis_server/wlma_server.c
Examining data/ctn-3.2.0~dfsg/apps/fillRSA/workImpInterp.c
Examining data/ctn-3.2.0~dfsg/apps/fillRSA/work.c
Examining data/ctn-3.2.0~dfsg/apps/fillRSA/fillRSA.c
Examining data/ctn-3.2.0~dfsg/apps/fillRSA/fillRSAImpInterp.c
Examining data/ctn-3.2.0~dfsg/apps/displays/pq_ctndisp.c
Examining data/ctn-3.2.0~dfsg/apps/displays/kill_ctndisp.c
Examining data/ctn-3.2.0~dfsg/apps/displays/image_utils.c
Examining data/ctn-3.2.0~dfsg/apps/displays/enq_ctndisp.c
Examining data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c
Examining data/ctn-3.2.0~dfsg/apps/displays/dcm_x_disp.h
Examining data/ctn-3.2.0~dfsg/apps/displays/dcm_x_disp.c
Examining data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c
Examining data/ctn-3.2.0~dfsg/apps/displays/ctndisp.h
Examining data/ctn-3.2.0~dfsg/apps/displays/common_x.h
Examining data/ctn-3.2.0~dfsg/apps/displays/common_disp.h
Examining data/ctn-3.2.0~dfsg/apps/displays/ctndisp.c
Examining data/ctn-3.2.0~dfsg/apps/dicom_echo/dicom_echo.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_w_disp/windows_disp.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_w_disp/menu_windows.h
Examining data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_w_disp/dcm_w_disp.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_w_disp/ctndisp.h
Examining data/ctn-3.2.0~dfsg/apps/dcm_w_disp/common_disp.h
Examining data/ctn-3.2.0~dfsg/apps/dcm_vr_patterns/dcm_vr_patterns.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_verify/dcm_verify.h
Examining data/ctn-3.2.0~dfsg/apps/dcm_verify/dcm_verify.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_to_xml/dcm_to_xml.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_to_text/dcm_to_text.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_to_html/dcm_to_html.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_template/dcm_template.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_strip_odd_groups/dcm_strip_odd_groups.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_snoop/dcm_snoop.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_rm_group/dcm_rm_group.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_rm_element/dcm_rm_element.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_resize/pixavg.h
Examining data/ctn-3.2.0~dfsg/apps/dcm_resize/pixavg.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_resize/dcm_resize.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_replace_element/dcm_replace_element.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_print_dictionary/dcm_print_dictionary.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_print_dictionary/dcm_dump_vector.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_pixel_bits/dcm_pixel_bits.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_modify_object/modify.h
Examining data/ctn-3.2.0~dfsg/apps/dcm_modify_object/lex_mod.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram_mod_w32.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram_mod.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram.h
Examining data/ctn-3.2.0~dfsg/apps/dcm_modify_object/dcm_modify_object.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_modify_elements/dcm_modify_elements.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_mb_to_euc/dcm_mb_to_euc.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_mask_image/dcm_mask_image.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_map_to_8/dcm_map_to_8.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_make_object/dcm_make_object.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_iterator/dcm_iterator.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_dump_file/dcm_dump_file.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_dump_element/dcm_dump_element.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_dump_compressed/dcm_dump_compressed.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_diff/dcm_diff.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_ctnto10/dcm_ctnto10.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_create_object/lex_mod.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_create_object/gram_mod.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_create_object/gram.h
Examining data/ctn-3.2.0~dfsg/apps/dcm_create_object/create.h
Examining data/ctn-3.2.0~dfsg/apps/dcm_create_object/dcm_create_object.c
Examining data/ctn-3.2.0~dfsg/apps/dcm_add_fragments/dcm_add_fragments.c
Examining data/ctn-3.2.0~dfsg/apps/dbfill/dbfill.h
Examining data/ctn-3.2.0~dfsg/apps/dbfill/dbfill.c
Examining data/ctn-3.2.0~dfsg/apps/database/dbremove.c
Examining data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c
Examining data/ctn-3.2.0~dfsg/apps/database/dbnumstudies.c
Examining data/ctn-3.2.0~dfsg/apps/database/dbnew.c
Examining data/ctn-3.2.0~dfsg/apps/database/dblststudies.c
Examining data/ctn-3.2.0~dfsg/apps/database/dblstseries.c
Examining data/ctn-3.2.0~dfsg/apps/database/dblstpats.c
Examining data/ctn-3.2.0~dfsg/apps/database/dblstimages.c
Examining data/ctn-3.2.0~dfsg/apps/database/dbdump.c
Examining data/ctn-3.2.0~dfsg/apps/database/dbdelstudy.c
Examining data/ctn-3.2.0~dfsg/apps/database/dbdelseries.c
Examining data/ctn-3.2.0~dfsg/apps/database/dbdelpat.c
Examining data/ctn-3.2.0~dfsg/apps/database/dbdeloldeststudy.c
Examining data/ctn-3.2.0~dfsg/apps/database/dbdelimage.c
Examining data/ctn-3.2.0~dfsg/apps/database/dbaddstudy.c
Examining data/ctn-3.2.0~dfsg/apps/database/dbaddseries.c
Examining data/ctn-3.2.0~dfsg/apps/database/dbaddpat.c
Examining data/ctn-3.2.0~dfsg/apps/database/dbaddimage.c
Examining data/ctn-3.2.0~dfsg/apps/ctnnetwork/pq_ctnnetwork.c
Examining data/ctn-3.2.0~dfsg/apps/ctnnetwork/kill_ctnnetwork.c
Examining data/ctn-3.2.0~dfsg/apps/ctnnetwork/enq_ctnnetwork.c
Examining data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c
Examining data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork.h
Examining data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork.c
Examining data/ctn-3.2.0~dfsg/apps/ctn_version/ctn_version.c
Examining data/ctn-3.2.0~dfsg/apps/ctn_validate_mb/ctn_validate_mb.c
Examining data/ctn-3.2.0~dfsg/apps/ctn_cutil/ctn_cutil.c
Examining data/ctn-3.2.0~dfsg/apps/create_greyscale_module/create_greyscale_module.c
Examining data/ctn-3.2.0~dfsg/apps/clone_study/remap.c
Examining data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.h
Examining data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/videoImageForm.h
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/videoImageForm.c
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/support.h
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/support.c
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/securityForm.h
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/securityForm.c
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/printServerCFGForm.h
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/printServerCFGForm.c
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/imageStorageControlForm.h
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/imageStorageControlForm.c
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/imageStorageAccessForm.h
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/imageStorageAccessForm.c
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/groupNamesForm.h
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/groupNamesForm.c
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.h
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/applicationShell1.h
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/applicationShell1.c
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/applicationForm.h
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/applicationForm.c
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/WorkingDialog.h
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/UxXt.h
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/UxXt.c
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/UxMethod.c
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/SutProto.h
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/SutList.h
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/Sut.h
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/SaPopCalls.h
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/SaConsoleCalls.h
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/SaAddLogin.h
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/FISAccessForm.h
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/FISAccessForm.c
Examining data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/cfg_ctn_tables.c
Examining data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.h
Examining data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c
Examining data/ctn-3.2.0~dfsg/apps/assoc_tool/structures.h
Examining data/ctn-3.2.0~dfsg/apps/assoc_tool/sopclasslist.h
Examining data/ctn-3.2.0~dfsg/apps/assoc_tool/prototypes.h
Examining data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c
Examining data/ctn-3.2.0~dfsg/apps/assoc_tool/load_sopClasses.c
Examining data/ctn-3.2.0~dfsg/apps/assoc_tool/format.h
Examining data/ctn-3.2.0~dfsg/apps/assoc_tool/assoc_tool.c
Examining data/ctn-3.2.0~dfsg/apps/assoc_tool/WorkingDialog.h
Examining data/ctn-3.2.0~dfsg/apps/assoc_tool/UxXt.h
Examining data/ctn-3.2.0~dfsg/apps/assoc_tool/UxXt.c
Examining data/ctn-3.2.0~dfsg/apps/assoc_tool/UxMethod.c
Examining data/ctn-3.2.0~dfsg/apps/assoc_tool/SutProto.h
Examining data/ctn-3.2.0~dfsg/apps/assoc_tool/SutList.h
Examining data/ctn-3.2.0~dfsg/apps/assoc_tool/Sut.h
Examining data/ctn-3.2.0~dfsg/apps/assoc_tool/SaPopCalls.h
Examining data/ctn-3.2.0~dfsg/apps/assoc_tool/SaConsoleCalls.h
Examining data/ctn-3.2.0~dfsg/apps/assoc_tool/SaAddLogin.h
Examining data/ctn-3.2.0~dfsg/apps/apps_include/print_queue.h
Examining data/ctn-3.2.0~dfsg/apps/apps_include/iqueues.h
Examining data/ctn-3.2.0~dfsg/apps/apps_include/UxXt.h
Examining data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c
Parsing failed to find end of parameter list; semicolon terminated it in ("<a href=""/cgi-bin/archive_agent.cgi?submitSearch=%s&DBKey=%s&StudyUID=%s"">%s</a><br>\n",
#endif

    printf(
"<a href=""/cgi-bin/archive_agent.cgi?submitSearch=%s&DBKey=%s&\
password=%s&StudyUID=%
Examining data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c
Parsing failed to find end of parameter list; semicolon terminated it in ("<a href=""/cgi-bin/archive_agent.cgi?submitSearch=%s&DBKey=%s&StudyUID=%s"">%s</a><br>\n",
#endif

    printf(
"<a href=""/cgi-bin/archive_agent.cgi?submitSearch=%s&DBKey=%s&\
password=%s&StudyUID=%
Examining data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h
Examining data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.h
Examining data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c
Examining data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/dicomServerInterface.h
Examining data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/dicomServerInterface.c
Examining data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c
Parsing failed to find end of parameter list; semicolon terminated it in ("<a href=""/cgi-bin/archive_cgi.cgi?submitSearch=%s&DBKey=%s&StudyUID=%s"">%s</a><br>\n",
#endif

    printf(
"<a href=""/cgi-bin/archive_cgi.cgi?submitSearch=%s&DBKey=%s&\
password=%s&StudyUID=%s"">
Examining data/ctn-3.2.0~dfsg/external/cgihtml-1.69/string-lib.h
Examining data/ctn-3.2.0~dfsg/external/cgihtml-1.69/string-lib.c
Examining data/ctn-3.2.0~dfsg/external/cgihtml-1.69/html-lib.h
Examining data/ctn-3.2.0~dfsg/external/cgihtml-1.69/html-lib.c
Examining data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-llist.h
Examining data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-llist.c
Examining data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.h
Examining data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c
Examining data/ctn-3.2.0~dfsg/facilities/xutl/xutl_mb.c
Examining data/ctn-3.2.0~dfsg/facilities/xutl/xutl.h
Examining data/ctn-3.2.0~dfsg/facilities/xutl/xutl.c
Examining data/ctn-3.2.0~dfsg/facilities/utility/utility.h
Examining data/ctn-3.2.0~dfsg/facilities/utility/utility.c
Examining data/ctn-3.2.0~dfsg/facilities/uid/uidcond.c
Examining data/ctn-3.2.0~dfsg/facilities/uid/uid.c
Examining data/ctn-3.2.0~dfsg/facilities/uid/dicom_uids.h
Examining data/ctn-3.2.0~dfsg/facilities/thread/thrcond.c
Examining data/ctn-3.2.0~dfsg/facilities/thread/ctnthread.h
Examining data/ctn-3.2.0~dfsg/facilities/thread/ctnthread.c
Examining data/ctn-3.2.0~dfsg/facilities/tblmb/tblmbprivate.h
Examining data/ctn-3.2.0~dfsg/facilities/tblmb/tblmbcond.c
Examining data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.h
Examining data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c
Examining data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb.h
Examining data/ctn-3.2.0~dfsg/facilities/tbl/ufs.c
Examining data/ctn-3.2.0~dfsg/facilities/tbl/tblprivate.h
Examining data/ctn-3.2.0~dfsg/facilities/tbl/tblcond.c
Examining data/ctn-3.2.0~dfsg/facilities/tbl/tbl_ufs.h
Examining data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.h
Examining data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c
Examining data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.h
Examining data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c
Examining data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.h
Examining data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c
Examining data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.h
Examining data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c
Examining data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.h
Examining data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c
Examining data/ctn-3.2.0~dfsg/facilities/tbl/tbl.h
Examining data/ctn-3.2.0~dfsg/facilities/tbl/sybase.c
Examining data/ctn-3.2.0~dfsg/facilities/sq/sqcond.c
Examining data/ctn-3.2.0~dfsg/facilities/sq/sequences.c
Examining data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h
Examining data/ctn-3.2.0~dfsg/facilities/snp/snpcond.c
Examining data/ctn-3.2.0~dfsg/facilities/snp/snp.h
Examining data/ctn-3.2.0~dfsg/facilities/snp/snp.c
Examining data/ctn-3.2.0~dfsg/facilities/snp/dlroutines.c
Examining data/ctn-3.2.0~dfsg/facilities/snp/decode.h
Examining data/ctn-3.2.0~dfsg/facilities/snp/decode.c
Examining data/ctn-3.2.0~dfsg/facilities/services/verify.c
Examining data/ctn-3.2.0~dfsg/facilities/services/storage.c
Examining data/ctn-3.2.0~dfsg/facilities/services/srvcond.c
Examining data/ctn-3.2.0~dfsg/facilities/services/srv2.c
Examining data/ctn-3.2.0~dfsg/facilities/services/srv1.c
Examining data/ctn-3.2.0~dfsg/facilities/services/services.c
Examining data/ctn-3.2.0~dfsg/facilities/services/send.c
Examining data/ctn-3.2.0~dfsg/facilities/services/private.h
Examining data/ctn-3.2.0~dfsg/facilities/services/private.c
Examining data/ctn-3.2.0~dfsg/facilities/services/nset.c
Examining data/ctn-3.2.0~dfsg/facilities/services/nget.c
Examining data/ctn-3.2.0~dfsg/facilities/services/neventreport.c
Examining data/ctn-3.2.0~dfsg/facilities/services/ndelete.c
Examining data/ctn-3.2.0~dfsg/facilities/services/ncreate.c
Examining data/ctn-3.2.0~dfsg/facilities/services/naction.c
Examining data/ctn-3.2.0~dfsg/facilities/services/dicom_services.h
Examining data/ctn-3.2.0~dfsg/facilities/services/cmd_valid.c
Examining data/ctn-3.2.0~dfsg/facilities/services/find.c
Examining data/ctn-3.2.0~dfsg/facilities/services/get.c
Examining data/ctn-3.2.0~dfsg/facilities/services/move.c
Examining data/ctn-3.2.0~dfsg/facilities/print/printcond.c
Examining data/ctn-3.2.0~dfsg/facilities/print/print.c
Examining data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h
Examining data/ctn-3.2.0~dfsg/facilities/objects/dicom_objects.h
Examining data/ctn-3.2.0~dfsg/facilities/objects/dcmsupport.c
Examining data/ctn-3.2.0~dfsg/facilities/objects/dcmcond.c
Examining data/ctn-3.2.0~dfsg/facilities/objects/dcm1.c
Examining data/ctn-3.2.0~dfsg/facilities/objects/dcmprivate.h
Examining data/ctn-3.2.0~dfsg/facilities/objects/dcm.c
Examining data/ctn-3.2.0~dfsg/facilities/objects/dcmdict.c
Examining data/ctn-3.2.0~dfsg/facilities/motif_utl/mut.h
Examining data/ctn-3.2.0~dfsg/facilities/motif_utl/motifutil.c
Examining data/ctn-3.2.0~dfsg/facilities/messages/ref_item.c
Examining data/ctn-3.2.0~dfsg/facilities/messages/nparse.c
Examining data/ctn-3.2.0~dfsg/facilities/messages/nbuild.c
Examining data/ctn-3.2.0~dfsg/facilities/messages/msgsupport.c
Examining data/ctn-3.2.0~dfsg/facilities/messages/msgprivate.h
Examining data/ctn-3.2.0~dfsg/facilities/messages/msgcond.c
Examining data/ctn-3.2.0~dfsg/facilities/messages/messages.c
Examining data/ctn-3.2.0~dfsg/facilities/messages/dump.c
Examining data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h
Examining data/ctn-3.2.0~dfsg/facilities/messages/cparse.c
Examining data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c
Examining data/ctn-3.2.0~dfsg/facilities/manage/set.c
Examining data/ctn-3.2.0~dfsg/facilities/manage/select.c
Examining data/ctn-3.2.0~dfsg/facilities/manage/mancond.c
Examining data/ctn-3.2.0~dfsg/facilities/manage/manage.h
Examining data/ctn-3.2.0~dfsg/facilities/manage/insert.c
Examining data/ctn-3.2.0~dfsg/facilities/manage/dmanprivate.h
Examining data/ctn-3.2.0~dfsg/facilities/manage/delete.c
Examining data/ctn-3.2.0~dfsg/facilities/manage/control.c
Examining data/ctn-3.2.0~dfsg/facilities/lst/lstprivate.h
Examining data/ctn-3.2.0~dfsg/facilities/lst/lstcond.c
Examining data/ctn-3.2.0~dfsg/facilities/lst/lst.h
Examining data/ctn-3.2.0~dfsg/facilities/lst/lst.c
Examining data/ctn-3.2.0~dfsg/facilities/irs/irscond.c
Examining data/ctn-3.2.0~dfsg/facilities/irs/irs_private.h
Examining data/ctn-3.2.0~dfsg/facilities/irs/irs.c
Examining data/ctn-3.2.0~dfsg/facilities/irs/dicom_irs.h
Examining data/ctn-3.2.0~dfsg/facilities/info_entity/tables.h
Examining data/ctn-3.2.0~dfsg/facilities/info_entity/iecond.c
Examining data/ctn-3.2.0~dfsg/facilities/info_entity/ie.c
Examining data/ctn-3.2.0~dfsg/facilities/info_entity/dicom_ie.h
Examining data/ctn-3.2.0~dfsg/facilities/iman/mancond.c
Examining data/ctn-3.2.0~dfsg/facilities/iman/iman.h
Examining data/ctn-3.2.0~dfsg/facilities/iman/iman.c
Examining data/ctn-3.2.0~dfsg/facilities/idbmb/idbmbcond.c
Examining data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h
Examining data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c
Examining data/ctn-3.2.0~dfsg/facilities/idb/idbcond.c
Examining data/ctn-3.2.0~dfsg/facilities/idb/idb.h
Examining data/ctn-3.2.0~dfsg/facilities/idb/idb.c
Examining data/ctn-3.2.0~dfsg/facilities/icpy/icpy.h
Examining data/ctn-3.2.0~dfsg/facilities/icon/iconcond.c
Examining data/ctn-3.2.0~dfsg/facilities/icon/icon.h
Examining data/ctn-3.2.0~dfsg/facilities/icon/icon.c
Examining data/ctn-3.2.0~dfsg/facilities/iap/iapcond.c
Examining data/ctn-3.2.0~dfsg/facilities/iap/iap.h
Examining data/ctn-3.2.0~dfsg/facilities/iap/iap.c
Examining data/ctn-3.2.0~dfsg/facilities/hunks/hunk_man.h
Examining data/ctn-3.2.0~dfsg/facilities/hunks/hunk_man.c
Examining data/ctn-3.2.0~dfsg/facilities/hunks/hunk_file.h
Examining data/ctn-3.2.0~dfsg/facilities/hunks/hunk_file.c
Examining data/ctn-3.2.0~dfsg/facilities/his/hisprivate.h
Examining data/ctn-3.2.0~dfsg/facilities/his/hisdb.h
Examining data/ctn-3.2.0~dfsg/facilities/his/hisdb.c
Examining data/ctn-3.2.0~dfsg/facilities/hap/hapcond.c
Examining data/ctn-3.2.0~dfsg/facilities/hap/hapbuildvisit.c
Examining data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c
Examining data/ctn-3.2.0~dfsg/facilities/hap/hapbuildresults.c
Examining data/ctn-3.2.0~dfsg/facilities/hap/hapbuildpatient.c
Examining data/ctn-3.2.0~dfsg/facilities/hap/hapbuildinterp.c
Examining data/ctn-3.2.0~dfsg/facilities/hap/hap.h
Examining data/ctn-3.2.0~dfsg/facilities/hap/hap.c
Examining data/ctn-3.2.0~dfsg/facilities/gq/gq.h
Examining data/ctn-3.2.0~dfsg/facilities/gq/gq.c
Examining data/ctn-3.2.0~dfsg/facilities/fis/update.c
Examining data/ctn-3.2.0~dfsg/facilities/fis/record.c
Examining data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c
Examining data/ctn-3.2.0~dfsg/facilities/fis/fisget.c
Examining data/ctn-3.2.0~dfsg/facilities/fis/fisdelete.c
Examining data/ctn-3.2.0~dfsg/facilities/fis/fiscond.c
Examining data/ctn-3.2.0~dfsg/facilities/fis/fis_private.h
Examining data/ctn-3.2.0~dfsg/facilities/fis/fis.h
Examining data/ctn-3.2.0~dfsg/facilities/fis/fis.c
Examining data/ctn-3.2.0~dfsg/facilities/fis/event.c
Examining data/ctn-3.2.0~dfsg/facilities/fis/build.c
Examining data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulstructures.h
Examining data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.h
Examining data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c
Examining data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.h
Examining data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c
Examining data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprivate.h
Examining data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulpresent.c
Examining data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulparse.c
Examining data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.h
Examining data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c
Examining data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c
Examining data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulcond.c
Examining data/ctn-3.2.0~dfsg/facilities/dicom/dicom_platform_w32.h
Examining data/ctn-3.2.0~dfsg/facilities/dicom/dicom_platform.h
Examining data/ctn-3.2.0~dfsg/facilities/dicom/ctn_os.h
Examining data/ctn-3.2.0~dfsg/facilities/dicom/dicom.h
Examining data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h
Examining data/ctn-3.2.0~dfsg/facilities/ddr/ddr.c
Examining data/ctn-3.2.0~dfsg/facilities/database/dbquery.h
Examining data/ctn-3.2.0~dfsg/facilities/database/dbprivate.h
Examining data/ctn-3.2.0~dfsg/facilities/database/database.c
Examining data/ctn-3.2.0~dfsg/facilities/condition/condition.h
Examining data/ctn-3.2.0~dfsg/facilities/condition/condition.c
Examining data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.h
Examining data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c
Examining data/ctn-3.2.0~dfsg/facilities/cfg/cfg.h
Examining data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c
Examining data/ctn-3.2.0~dfsg/facilities/blg/blg.h
Examining data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c
Examining data/ctn-3.2.0~dfsg/testapps/ramp/ramp8.c
Examining data/ctn-3.2.0~dfsg/testapps/ramp/ramp16.c
Examining data/ctn-3.2.0~dfsg/debian/test-endian.c
Examining data/ctn-3.2.0~dfsg/debian/test-sizes.c

FINAL RESULTS:

data/ctn-3.2.0~dfsg/apps/assoc_tool/UxMethod.c:231:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Names[NumNames], name);
data/ctn-3.2.0~dfsg/apps/assoc_tool/load_sopClasses.c:128:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(e->sopclass, classes[i][0]);
data/ctn-3.2.0~dfsg/apps/assoc_tool/load_sopClasses.c:129:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(e->sopclassW, classes[i][1]);
data/ctn-3.2.0~dfsg/apps/assoc_tool/load_sopClasses.c:168:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void) sprintf(buf, "%-64s", e->sopclass);
data/ctn-3.2.0~dfsg/apps/assoc_tool/load_sopClasses.c:209:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(se->selectedsopclass, e->sopclass);
data/ctn-3.2.0~dfsg/apps/assoc_tool/load_sopClasses.c:210:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(se->selectedsopclassW, e->sopclassW);
data/ctn-3.2.0~dfsg/apps/assoc_tool/load_sopClasses.c:212:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(se->tSyntaxes[0], DICOM_TRANSFERLITTLEENDIAN);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:185:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.calledPresentationAddress, node);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:187:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(params.calledPresentationAddress, port);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:188:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:189:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.calledAPTitle, calledAPTitle);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:190:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingAPTitle, callingAPTitle);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:253:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(buffer, buff);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:256:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(buffer, buff);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:259:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(buffer, buff);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:261:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(info, buffer);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:284:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(bufsyn, "%30s", d.description);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:286:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(buf1, "%30s", context->abstractSyntax);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:290:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(buf2, "%s,%s ", d.description, d.originator);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:294:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(info, buf1);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:296:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(info, buf2);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:298:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(info, bufsyn);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:422:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(info, buff);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:434:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(info, mes);
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:381:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(s->tSyntaxes[i++], DICOM_TRANSFERLITTLEENDIAN);
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:384:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(s->tSyntaxes[i++], DICOM_TRANSFERLITTLEENDIANEXPLICIT);
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:387:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(s->tSyntaxes[i++], DICOM_TRANSFERBIGENDIANEXPLICIT);
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:687:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(buf_mes, sopstr2);
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:739:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(node, text_typed);
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:747:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(port, text_typed);
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:755:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(callingAPTitle, text_typed);
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:763:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(calledAPTitle, text_typed);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/UxMethod.c:231:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Names[NumNames], name);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:24:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(temp, "%16s", ae->Title);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:26:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(temp, "%16s", "");
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:27:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(buf, temp);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:30:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(temp, "%20s", ae->Node);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:32:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(temp, "%20s", "");
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:33:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(buf, temp);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:36:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(temp, "%20s", ae->Organization);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:38:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(temp, "%20s", "");
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:39:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(buf, temp);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:44:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(temp, "%10s", "");
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:45:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(buf, temp);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:49:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(buf, ae->Comment);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:75:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void) sprintf(buf, "%-16s     %-16s", s->RequestingTitle,
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:98:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void) sprintf(buf, "%-16s     %-16s %-5d", p->RequestingTitle,
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:112:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, g->GroupName);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:118:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, g->Title);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:124:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buf, "%-16s %-20s %-16s %-40s", f->Title, f->DbKey,
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:136:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buf, "%-16s %-20s ", s->Title, s->DbKey);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:139:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(temp, "%-16s ", s->Owner);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:141:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(temp, "%-16s ", "");
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:143:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(buf, temp);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:146:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(temp, "%-16s ", s->GroupName);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:148:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(temp, "%-16s ", "");
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:151:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(buf, temp);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:153:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(temp, "%-30s ", s->Comment);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:155:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(temp, "%-30s ", "");
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:157:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(buf, temp);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:170:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buf, "%-16s %-16s %-80s", s->RequestingTitle, s->RespondingTitle,
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:182:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buf, "%-16s %-16s %-16s",
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:122:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->patient.PatNam, query->patient.PatNam);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:123:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->patient.PatID, query->patient.PatID);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:124:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->patient.PatBirDat, query->patient.PatBirDat);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:125:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->patient.PatBirTim, query->patient.PatBirTim);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:126:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->patient.PatSex, query->patient.PatSex);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:128:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->patient.Owner, query->patient.Owner);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:129:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->patient.GroupName, query->patient.GroupName);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:130:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->patient.Priv, query->patient.Priv);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:132:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->study.StuDat, query->study.StuDat);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:133:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->study.StuTim, query->study.StuTim);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:134:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->study.AccNum, query->study.AccNum);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:135:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->study.StuID, query->study.StuID);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:136:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->study.StuInsUID, query->study.StuInsUID);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:137:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->study.RefPhyNam, query->study.RefPhyNam);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:138:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->study.StuDes, query->study.StuDes);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:139:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->study.PatAge, query->study.PatAge);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:140:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->study.PatSiz, query->study.PatSiz);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:141:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->study.PatWei, query->study.PatWei);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:143:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->study.Owner, query->study.Owner);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:144:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->study.GroupName, query->study.GroupName);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:145:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->study.Priv, query->study.Priv);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:147:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->series.Mod, query->series.Mod);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:148:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->series.SerNum, query->series.SerNum);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:149:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->series.SerInsUID, query->series.SerInsUID);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:150:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->series.ProNam, query->series.ProNam);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:151:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->series.SerDes, query->series.SerDes);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:152:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->series.BodParExa, query->series.BodParExa);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:153:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->series.ViePos, query->series.ViePos);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:155:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->series.Owner, query->series.Owner);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:156:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->series.GroupName, query->series.GroupName);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:157:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->series.Priv, query->series.Priv);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:159:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->image.ImaNum, query->image.ImaNum);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:160:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->image.SOPInsUID, query->image.SOPInsUID);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:161:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->image.SOPClaUID, query->image.SOPClaUID);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:162:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->image.PhoInt, query->image.PhoInt);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:163:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->image.PatOri, query->image.PatOri);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:172:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->image.Owner, query->image.Owner);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:173:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->image.GroupName, query->image.GroupName);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:174:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->image.Priv, query->image.Priv);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:181:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->image.RespondingTitle, e1->RespondingTitle);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:182:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->image.Medium, e1->Medium);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:183:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->image.Path, e1->Path);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:184:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pssi->image.Transfer, e1->Transfer);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:399:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(recs.patient.PatID, patientID);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:403:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(recs.study.StuInsUID, studyInstanceUID);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:407:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(recs.study.AccNum, accessionNumber);
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:61:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(map->orig, orig);
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:62:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(map->mapped, mapped);
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:237:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(mapped->patient.PatNam, map->mapped);
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:245:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(mapped->patient.PatNam, map->mapped);
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:259:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(mapped->patient.PatID, map->mapped);
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:267:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(mapped->patient.PatID, map->mapped);
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:281:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(mapped->study.AccNum, map->mapped);
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:289:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(mapped->study.AccNum, map->mapped);
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:303:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(mapped->study.StuInsUID, map->mapped);
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:311:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(mapped->study.StuInsUID, map->mapped);
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:325:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(mapped->series.SerInsUID, map->mapped);
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:333:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(mapped->series.SerInsUID, map->mapped);
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:346:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(mapped->image.SOPInsUID, map->mapped);
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:354:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(mapped->image.SOPInsUID, map->mapped);
data/ctn-3.2.0~dfsg/apps/ctn_validate_mb/ctn_validate_mb.c:155:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(imageCharSet, specificCharSet);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork.c:194:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(G_nodename, *argv);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork.c:260:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(G_nodename, element.vendorid);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork.c:261:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(G_dpnname, element.dpnid);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork.c:298:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(G_dpnname, element.dpnid);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork.c:299:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(G_nodename, element.vendorid);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork.c:349:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(G_Array[i].vendorid, element->vendorid);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork.c:350:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(G_Array[i].dpnid, element->dpnid);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork.c:403:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(G_Array[index].vendorid, element->vendorid);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork.c:404:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(G_Array[index].dpnid, element->dpnid);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:218:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(temp, "Close [%s] ==> CTN (%d)",
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:222:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(temp, "Close [%s] <== CTN (%d)",
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:277:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(temp, "[%s] ==> CTN", G_Array[slot].dpnid);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:289:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(temp, "[%s] <== CTN", G_Array[slot].dpnid);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:325:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(temp, "Open [%s] ==> CTN", G_Array[slot].dpnid);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:327:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(temp, "Open [%s] <== CTN", G_Array[slot].dpnid);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:372:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(temp, "Open [%s] ==> CTN", G_Array[i].dpnid);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:386:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(temp, "Open [%s] <== CTN", G_Array[i].dpnid);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:397:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(temp, "Close [%s] ==> CTN (%d)",
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:410:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(temp, "Close [%s] <== CTN (%d)",
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:434:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(temp, "[%s] ==> CTN", G_Array[i].dpnid);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:457:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(temp, "[%s] <== CTN", G_Array[i].dpnid);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:533:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tc_large, FONT_LG_B);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:535:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tc_large, FONT_LG_A);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/enq_ctnnetwork.c:79:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(e.vendorid, argv[2]);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/enq_ctnnetwork.c:80:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(e.dpnid, argv[3]);
data/ctn-3.2.0~dfsg/apps/database/dbaddimage.c:74:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(image.ImageNumber, argv[1]);
data/ctn-3.2.0~dfsg/apps/database/dbaddimage.c:75:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(image.ImageUID, argv[2]);
data/ctn-3.2.0~dfsg/apps/database/dbaddimage.c:76:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(image.ClassUID, argv[3]);
data/ctn-3.2.0~dfsg/apps/database/dbaddimage.c:77:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(image.FileName, argv[4]);
data/ctn-3.2.0~dfsg/apps/database/dbaddimage.c:78:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patid, argv[5]);
data/ctn-3.2.0~dfsg/apps/database/dbaddimage.c:79:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(studyuid, argv[6]);
data/ctn-3.2.0~dfsg/apps/database/dbaddimage.c:80:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(seriesuid, argv[7]);
data/ctn-3.2.0~dfsg/apps/database/dbaddimage.c:81:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dbname, argv[8]);
data/ctn-3.2.0~dfsg/apps/database/dbaddpat.c:69:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pat.BirthDate, argv[1]);
data/ctn-3.2.0~dfsg/apps/database/dbaddpat.c:70:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pat.Name, argv[2]);
data/ctn-3.2.0~dfsg/apps/database/dbaddpat.c:71:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pat.PatID, argv[3]);
data/ctn-3.2.0~dfsg/apps/database/dbaddpat.c:72:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dbname, argv[4]);
data/ctn-3.2.0~dfsg/apps/database/dbaddseries.c:72:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(series.Modality, argv[1]);
data/ctn-3.2.0~dfsg/apps/database/dbaddseries.c:73:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(series.SeriesNumber, argv[2]);
data/ctn-3.2.0~dfsg/apps/database/dbaddseries.c:74:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(series.SeriesUID, argv[3]);
data/ctn-3.2.0~dfsg/apps/database/dbaddseries.c:75:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patid, argv[4]);
data/ctn-3.2.0~dfsg/apps/database/dbaddseries.c:76:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(studyuid, argv[5]);
data/ctn-3.2.0~dfsg/apps/database/dbaddseries.c:77:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dbname, argv[6]);
data/ctn-3.2.0~dfsg/apps/database/dbaddstudy.c:71:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(study.StudyDate, argv[1]);
data/ctn-3.2.0~dfsg/apps/database/dbaddstudy.c:72:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(study.StudyTime, argv[2]);
data/ctn-3.2.0~dfsg/apps/database/dbaddstudy.c:73:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(study.StudyID, argv[3]);
data/ctn-3.2.0~dfsg/apps/database/dbaddstudy.c:74:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(study.AccessionNumber, argv[4]);
data/ctn-3.2.0~dfsg/apps/database/dbaddstudy.c:75:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(study.StudyUID, argv[5]);
data/ctn-3.2.0~dfsg/apps/database/dbaddstudy.c:76:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(study.ReferringPhysName, argv[6]);
data/ctn-3.2.0~dfsg/apps/database/dbaddstudy.c:77:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(study.InterpretingPhysName, argv[7]);
data/ctn-3.2.0~dfsg/apps/database/dbaddstudy.c:78:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(study.ProcedureDescription, argv[8]);
data/ctn-3.2.0~dfsg/apps/database/dbaddstudy.c:79:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(study.AdmittingDiagnosedDescription, argv[9]);
data/ctn-3.2.0~dfsg/apps/database/dbaddstudy.c:80:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patid, argv[10]);
data/ctn-3.2.0~dfsg/apps/database/dbaddstudy.c:81:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dbname, argv[11]);
data/ctn-3.2.0~dfsg/apps/database/dbdelimage.c:72:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(imageuid, argv[1]);
data/ctn-3.2.0~dfsg/apps/database/dbdelimage.c:73:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patid, argv[2]);
data/ctn-3.2.0~dfsg/apps/database/dbdelimage.c:74:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(studyuid, argv[3]);
data/ctn-3.2.0~dfsg/apps/database/dbdelimage.c:75:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(seriesuid, argv[4]);
data/ctn-3.2.0~dfsg/apps/database/dbdelimage.c:76:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dbname, argv[5]);
data/ctn-3.2.0~dfsg/apps/database/dbdelpat.c:68:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pat, argv[1]);
data/ctn-3.2.0~dfsg/apps/database/dbdelpat.c:69:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dbname, argv[2]);
data/ctn-3.2.0~dfsg/apps/database/dbdelseries.c:71:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(seriesuid, argv[1]);
data/ctn-3.2.0~dfsg/apps/database/dbdelseries.c:72:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patid, argv[2]);
data/ctn-3.2.0~dfsg/apps/database/dbdelseries.c:73:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(studyuid, argv[3]);
data/ctn-3.2.0~dfsg/apps/database/dbdelseries.c:74:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dbname, argv[4]);
data/ctn-3.2.0~dfsg/apps/database/dbdelstudy.c:70:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(study, argv[1]);
data/ctn-3.2.0~dfsg/apps/database/dbdelstudy.c:71:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patid, argv[2]);
data/ctn-3.2.0~dfsg/apps/database/dbdelstudy.c:72:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dbname, argv[3]);
data/ctn-3.2.0~dfsg/apps/database/dbdump.c:67:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dbname, argv[1]);
data/ctn-3.2.0~dfsg/apps/database/dblstimages.c:77:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patid, argv[1]);
data/ctn-3.2.0~dfsg/apps/database/dblstimages.c:78:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(studyuid, argv[2]);
data/ctn-3.2.0~dfsg/apps/database/dblstimages.c:79:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(seriesuid, argv[3]);
data/ctn-3.2.0~dfsg/apps/database/dblstimages.c:80:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dbname, argv[4]);
data/ctn-3.2.0~dfsg/apps/database/dblstpats.c:75:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dbname, argv[1]);
data/ctn-3.2.0~dfsg/apps/database/dblstseries.c:76:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patid, argv[1]);
data/ctn-3.2.0~dfsg/apps/database/dblstseries.c:77:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(studyuid, argv[2]);
data/ctn-3.2.0~dfsg/apps/database/dblstseries.c:78:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dbname, argv[3]);
data/ctn-3.2.0~dfsg/apps/database/dblststudies.c:75:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patid, argv[1]);
data/ctn-3.2.0~dfsg/apps/database/dblststudies.c:76:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dbname, argv[2]);
data/ctn-3.2.0~dfsg/apps/dbfill/dbfill.c:161:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(fileName, "%s%s", current_dir, av[arg]);
data/ctn-3.2.0~dfsg/apps/dbfill/dbfill.c:162:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    if (access(fileName, 04))	/* We we have read access ? */
data/ctn-3.2.0~dfsg/apps/dbfill/dbfill.c:398:5:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    vsprintf(p, fmt, arg_ptr);
data/ctn-3.2.0~dfsg/apps/dcm_create_object/gram_mod.c:516:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(mvi->str, yyvsp[0].str);
data/ctn-3.2.0~dfsg/apps/dcm_create_object/gram_mod.c:542:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(mvi->str, yyvsp[0].str);
data/ctn-3.2.0~dfsg/apps/dcm_create_object/gram_mod.c:562:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(mvi->str, yyvsp[0].str);
data/ctn-3.2.0~dfsg/apps/dcm_create_object/gram_mod.c:588:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(mvi->str, yyvsp[0].str);
data/ctn-3.2.0~dfsg/apps/dcm_create_object/lex_mod.c:711:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    		strcpy(yylval.str, yytext);
data/ctn-3.2.0~dfsg/apps/dcm_create_object/lex_mod.c:721:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    		strcpy(yylval.str, &yytext[1]);
data/ctn-3.2.0~dfsg/apps/dcm_ctnto10/dcm_ctnto10.c:137:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fileMeta->transferSyntaxUID, DICOM_TRANSFERBIGENDIANEXPLICIT);
data/ctn-3.2.0~dfsg/apps/dcm_ctnto10/dcm_ctnto10.c:140:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fileMeta->transferSyntaxUID, DICOM_TRANSFERLITTLEENDIANEXPLICIT);
data/ctn-3.2.0~dfsg/apps/dcm_dump_compressed/dcm_dump_compressed.c:95:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(fileName, "%s.%-d", (char *) ctx, index);
data/ctn-3.2.0~dfsg/apps/dcm_dump_file/dcm_dump_file.c:89:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(p2, f);
data/ctn-3.2.0~dfsg/apps/dcm_dump_file/dcm_dump_file.c:91:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(p2, item->path);
data/ctn-3.2.0~dfsg/apps/dcm_dump_file/dcm_dump_file.c:100:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p->path, f);
data/ctn-3.2.0~dfsg/apps/dcm_iterator/dcm_iterator.c:90:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(p2, f);
data/ctn-3.2.0~dfsg/apps/dcm_iterator/dcm_iterator.c:92:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(p2, item->path);
data/ctn-3.2.0~dfsg/apps/dcm_iterator/dcm_iterator.c:101:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p->path, f);
data/ctn-3.2.0~dfsg/apps/dcm_mb_to_euc/dcm_mb_to_euc.c:153:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(imageCharSet, specificCharSet);
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram_mod.c:605:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
						printf( _POP_, *yy_ps,
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram_mod.c:842:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(mvi->str, yypvt[-0].str);
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram_mod.c:867:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(mvi->str, yypvt[-0].str);
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram_mod.c:886:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(mvi->str, yypvt[-0].str);
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram_mod.c:911:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(mvi->str, yypvt[-0].str);
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram_mod_w32.c:605:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
						printf( _POP_, *yy_ps,
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram_mod_w32.c:842:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(mvi->str, yypvt[-0].str);
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram_mod_w32.c:867:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(mvi->str, yypvt[-0].str);
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram_mod_w32.c:886:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(mvi->str, yypvt[-0].str);
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram_mod_w32.c:911:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(mvi->str, yypvt[-0].str);
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/lex_mod.c:710:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    		strcpy(yylval.str, &yytext[1]);
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/lex_mod.c:721:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    		strcpy(yylval.str, yytext);
data/ctn-3.2.0~dfsg/apps/dcm_print_dictionary/dcm_print_dictionary.c:198:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(n->e.description, description);
data/ctn-3.2.0~dfsg/apps/dcm_print_dictionary/dcm_print_dictionary.c:216:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(n->e.description, description);
data/ctn-3.2.0~dfsg/apps/dcm_to_text/dcm_to_text.c:111:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(line, txt);
data/ctn-3.2.0~dfsg/apps/dcm_to_text/dcm_to_text.c:151:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(line, e->description);
data/ctn-3.2.0~dfsg/apps/dcm_to_xml/dcm_to_xml.c:113:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(tag, e->description);
data/ctn-3.2.0~dfsg/apps/dcm_to_xml/dcm_to_xml.c:146:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(tag, e->description);
data/ctn-3.2.0~dfsg/apps/dcm_verify/dcm_verify.c:183:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(UID, ieObject->classUID);
data/ctn-3.2.0~dfsg/apps/dcm_vr_patterns/dcm_vr_patterns.c:82:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(txt, f);
data/ctn-3.2.0~dfsg/apps/dcm_vr_patterns/dcm_vr_patterns.c:291:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(fileMeta->transferSyntaxUID, DICOM_TRANSFERLITTLEENDIAN);
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:274:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(idata->error_message, "Can't open ACR file: %s", filename);
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:283:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(idata->error_message, "Required parameter(s) missing: %s", filename);
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:300:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(idata->error_message, "Can't get pixel data size for: %s", filename);
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:325:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(idata->error_message, "Can't allocate memory for: %s", filename);
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:337:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(idata->error_message, "Can't get pixel data for: %s", filename);
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:345:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(idata->error_message, "Can't get pixel data for: %s", filename);
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:1267:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(idata->date, cptr);
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:1275:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(idata->modality, cptr);
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:1283:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(idata->patname, cptr);
data/ctn-3.2.0~dfsg/apps/dicom_echo/dicom_echo.c:240:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(params.calledPresentationAddress, "%s:%s", node, *argv);
data/ctn-3.2.0~dfsg/apps/dicom_echo/dicom_echo.c:241:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(params.callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/dicom_echo/dicom_echo.c:242:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(params.calledAPTitle, calledAPTitle);
data/ctn-3.2.0~dfsg/apps/dicom_echo/dicom_echo.c:243:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(params.callingAPTitle, callingAPTitle);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp.c:232:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(G_nodename, *argv);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp.c:287:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(G_dpnname, element.dpnid);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp.c:343:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(G_dpnname, element.dpnid);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:378:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(patient_string, img->patname);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:380:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(patient_string, img->date);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:382:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(patient_string, img->modality);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:384:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(patient_string, img->study);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:571:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patient_string, img->patname);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:573:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(patient_string, img->date);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:575:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(patient_string, img->modality);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:577:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(patient_string, img->study);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:657:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(temp, G_nodename);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:659:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(temp, G_dpnname);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:712:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(temp, G_nodename);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:714:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(temp, G_dpnname);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:875:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tc_small, FONT_SM_B);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:876:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tc_large, FONT_LG_B);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:878:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tc_small, FONT_SM_A);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:879:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tc_large, FONT_LG_A);
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_disp.c:240:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(dicom_file, *argv);
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:279:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(patient_string, img->patname);
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:281:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(patient_string, img->date);
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:283:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(patient_string, img->modality);
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:285:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(patient_string, img->study);
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:458:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patient_string, img->patname);
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:460:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(patient_string, img->date);
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:462:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(patient_string, img->modality);
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:464:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(patient_string, img->study);
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:526:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tc_small, FONT_SM_B);
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:527:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tc_large, FONT_LG_B);
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:529:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tc_small, FONT_SM_A);
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:530:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tc_large, FONT_LG_A);
data/ctn-3.2.0~dfsg/apps/displays/enq_ctndisp.c:76:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(e.imagefile, argv[2]);
data/ctn-3.2.0~dfsg/apps/displays/enq_ctndisp.c:77:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(e.dpnid, argv[3]);
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:441:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(idata->error_message, "Can't open ACR file: %s", filename);
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:459:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(idata->error_message, "Required parameter(s) missing: %s", filename);
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:476:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(idata->error_message, "Can't get pixel data size for: %s", filename);
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:501:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(idata->error_message, "Can't allocate memory for: %s", filename);
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:513:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(idata->error_message, "Can't get pixel data for: %s", filename);
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:521:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(idata->error_message, "Can't get pixel data for: %s", filename);
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:1465:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(idata->date, cptr);
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:1473:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(idata->modality, cptr);
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:1481:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(idata->patname, cptr);
data/ctn-3.2.0~dfsg/apps/displays/kill_ctndisp.c:82:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(e.imagefile, KILL_DISPLAY);
data/ctn-3.2.0~dfsg/apps/fillRSA/work.c:257:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(queryStructure.patient.PatID, p->PatID);
data/ctn-3.2.0~dfsg/apps/fillRSA/work.c:397:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(queryStructure.patient.PatID, q->patient.PatID);
data/ctn-3.2.0~dfsg/apps/fillRSA/work.c:398:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(queryStructure.study.StuInsUID, q->study.StuInsUID);
data/ctn-3.2.0~dfsg/apps/fillRSA/work.c:540:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(queryStructure.patient.PatID, q->patient.PatID);
data/ctn-3.2.0~dfsg/apps/fillRSA/work.c:541:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(queryStructure.study.StuInsUID, q->study.StuInsUID);
data/ctn-3.2.0~dfsg/apps/fillRSA/work.c:542:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(queryStructure.series.SerInsUID, q->series.SerInsUID);
data/ctn-3.2.0~dfsg/apps/fillRSA/work.c:601:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dst, src);
data/ctn-3.2.0~dfsg/apps/fillRSA/workImpInterp.c:122:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    if (sscanf(line, "%s", studyInstanceUID) != 1)
data/ctn-3.2.0~dfsg/apps/fillRSA/workImpInterp.c:139:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(results.Imp, line);
data/ctn-3.2.0~dfsg/apps/fillRSA/workImpInterp.c:164:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(interpretation.IntTex, line);
data/ctn-3.2.0~dfsg/apps/fillRSA/workImpInterp.c:187:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(interpretation.IntDiaDes, interpretation.IntTex);
data/ctn-3.2.0~dfsg/apps/fis_server/association.c:133:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(service->calledImplementationClassUID,
data/ctn-3.2.0~dfsg/apps/fis_server/association.c:135:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(service->calledImplementationVersionName,
data/ctn-3.2.0~dfsg/apps/fis_server/fis_server.c:144:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(node, *argv);
data/ctn-3.2.0~dfsg/apps/fis_server/fis_server.c:257:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(e->callingAPTitle, service->callingAPTitle);
data/ctn-3.2.0~dfsg/apps/fis_server/fis_server.c:258:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(e->calledAPTitle, service->calledAPTitle);
data/ctn-3.2.0~dfsg/apps/fis_server/ncreate.c:158:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/fis_server/ncreate.c:207:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/fis_server/ncreate.c:229:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(sc.StuComUID, request->instanceUID);
data/ctn-3.2.0~dfsg/apps/fis_server/ncreate.c:239:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->instanceUID, sc.StuComUID);
data/ctn-3.2.0~dfsg/apps/fis_server/ncreate.c:249:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(series->StuComUID, sc.StuComUID);
data/ctn-3.2.0~dfsg/apps/fis_server/ncreate.c:259:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(image->SerInsUID, series->SerInsUID);
data/ctn-3.2.0~dfsg/apps/fis_server/ncreate.c:260:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(image->StuComUID, series->StuComUID);
data/ctn-3.2.0~dfsg/apps/fis_server/ncreate.c:276:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(study.StuInsUID, sc.StuInsUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nget.c:184:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nget.c:185:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->affectedInstanceUID, request->requestedInstanceUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nget.c:256:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patient.PatUID, request->requestedInstanceUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nget.c:351:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(study.StuInsUID, request->requestedInstanceUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nget.c:407:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(studyComponent.StuComUID, request->requestedInstanceUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nget.c:456:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(results.ResUID, request->requestedInstanceUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nget.c:507:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(interpretation.IntUID, request->requestedInstanceUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nset.c:173:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nset.c:174:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->instanceUID, request->instanceUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nset.c:224:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patient.PatUID, request->requestedInstanceUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nset.c:279:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(study.StuInsUID, request->instanceUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nset.c:288:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nset.c:289:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->instanceUID, request->instanceUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nset.c:315:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(results.ResUID, request->requestedInstanceUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nset.c:354:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(interpretation.IntUID, request->requestedInstanceUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nset.c:407:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(sc.StuComUID, request->instanceUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nset.c:429:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(series->StuComUID, sc.StuComUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nset.c:439:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(image->SerInsUID, series->SerInsUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nset.c:440:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(image->StuComUID, series->StuComUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nset.c:459:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/fis_server/nset.c:460:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->instanceUID, request->instanceUID);
data/ctn-3.2.0~dfsg/apps/fis_server/requests.c:154:2:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	access;
data/ctn-3.2.0~dfsg/apps/fis_server/requests.c:161:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				    &access);
data/ctn-3.2.0~dfsg/apps/fis_server/requests.c:164:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	cond = FIS_Open(access.DbKey, &FISHandle);
data/ctn-3.2.0~dfsg/apps/fis_server/requests.c:349:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/fis_server/wlma_server.c:106:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(node, *argv);
data/ctn-3.2.0~dfsg/apps/fis_server/wlma_server.c:203:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(e->callingAPTitle, service->callingAPTitle);
data/ctn-3.2.0~dfsg/apps/fis_server/wlma_server.c:204:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(e->calledAPTitle, service->calledAPTitle);
data/ctn-3.2.0~dfsg/apps/icon/create_db_entry.c:117:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    if (sscanf(*argv++, "%s", dbfile) != 1)
data/ctn-3.2.0~dfsg/apps/icon/create_db_entry.c:122:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void) sprintf(imgfile, "%s/%s", cwd, *argv++);
data/ctn-3.2.0~dfsg/apps/icon/create_db_entry.c:123:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void) sprintf(prefmtImgfile, "%s/%s", cwd, *argv++);
data/ctn-3.2.0~dfsg/apps/icon/create_db_entry.c:125:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void) sprintf(imgfile, "%s", *argv++);
data/ctn-3.2.0~dfsg/apps/icon/create_db_entry.c:126:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void) sprintf(prefmtImgfile, "%s", *argv++);
data/ctn-3.2.0~dfsg/apps/icon/create_db_entry.c:150:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!access(imgfile, R_OK))
data/ctn-3.2.0~dfsg/apps/icon/create_print_entry.c:160:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    if (sscanf(*argv++, "%s", dbfile) != 1)
data/ctn-3.2.0~dfsg/apps/icon/create_print_entry.c:165:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void) sprintf(imgfile, "%s/%s", cwd, *argv++);
data/ctn-3.2.0~dfsg/apps/icon/create_print_entry.c:166:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void) sprintf(prefmtImgfile, "%s/%s", cwd, *argv++);
data/ctn-3.2.0~dfsg/apps/icon/create_print_entry.c:168:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void) sprintf(imgfile, "%s", *argv++);
data/ctn-3.2.0~dfsg/apps/icon/create_print_entry.c:169:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void) sprintf(prefmtImgfile, "%s", *argv++);
data/ctn-3.2.0~dfsg/apps/icon/create_print_entry.c:193:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!access(imgfile, R_OK))
data/ctn-3.2.0~dfsg/apps/icon/icon_append_file.c:311:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(studyicon.accessionNumber, accessionNumber);
data/ctn-3.2.0~dfsg/apps/icon/icon_append_file.c:312:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(studyicon.UID, SOPInstanceUID);
data/ctn-3.2.0~dfsg/apps/icon/icon_append_file.c:358:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(rslt, src);
data/ctn-3.2.0~dfsg/apps/icon/icon_append_index.c:255:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(studyoffset.accessionNumber, accessionNumber);
data/ctn-3.2.0~dfsg/apps/icon/icon_append_index.c:300:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(rslt, src);
data/ctn-3.2.0~dfsg/apps/idb_viewer/UxMethod.c:231:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Names[NumNames], name);
data/ctn-3.2.0~dfsg/apps/idb_viewer/applicationShell1.c:273:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(query.patient.PatID, patientID);
data/ctn-3.2.0~dfsg/apps/idb_viewer/applicationShell1.c:316:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(query.patient.PatID, patientID);
data/ctn-3.2.0~dfsg/apps/idb_viewer/applicationShell1.c:317:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(query.study.StuInsUID, studyInstanceUID);
data/ctn-3.2.0~dfsg/apps/idb_viewer/applicationShell1.c:360:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(query.patient.PatID, patientID);
data/ctn-3.2.0~dfsg/apps/idb_viewer/applicationShell1.c:361:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(query.study.StuInsUID, studyInstanceUID);
data/ctn-3.2.0~dfsg/apps/idb_viewer/applicationShell1.c:362:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(query.series.SerInsUID, seriesInstanceUID);
data/ctn-3.2.0~dfsg/apps/idb_viewer/format.c:96:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%-16s %-30s %-12s",
data/ctn-3.2.0~dfsg/apps/idb_viewer/format.c:132:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(accession, item->query.study.AccNum);
data/ctn-3.2.0~dfsg/apps/idb_viewer/format.c:134:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(studyID, item->query.study.StuID);
data/ctn-3.2.0~dfsg/apps/idb_viewer/format.c:136:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void) sprintf(buf, "%-64s %-16s %-16s",
data/ctn-3.2.0~dfsg/apps/idb_viewer/format.c:167:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void) sprintf(buf, "%-64s",
data/ctn-3.2.0~dfsg/apps/idb_viewer/format.c:195:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void) sprintf(buf, "%-64s",
data/ctn-3.2.0~dfsg/apps/idb_viewer/format.c:223:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void) sprintf(buf, "%-80s",
data/ctn-3.2.0~dfsg/apps/image_archive/archive_cleaner.c:180:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(query.study.InsertDate, dateString);
data/ctn-3.2.0~dfsg/apps/image_archive/archive_cleaner.c:181:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(query.study.InsertTime, timeString);
data/ctn-3.2.0~dfsg/apps/image_archive/archive_cleaner.c:204:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(query.study.InsertDate, dateString);
data/ctn-3.2.0~dfsg/apps/image_archive/archive_cleaner.c:287:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(query.patient.InsertDate, dateString);
data/ctn-3.2.0~dfsg/apps/image_archive/archive_cleaner.c:288:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(query.patient.InsertTime, timeString);
data/ctn-3.2.0~dfsg/apps/image_archive/archive_cleaner.c:312:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(query.patient.InsertDate, dateString);
data/ctn-3.2.0~dfsg/apps/image_archive/archive_server.c:264:12:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    (void) vfprintf(fp, controlString, args);
data/ctn-3.2.0~dfsg/apps/image_archive/archive_server.c:514:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(node, *argv);
data/ctn-3.2.0~dfsg/apps/image_archive/archive_server.c:589:6:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    fprintf(stderr, uidError, port);
data/ctn-3.2.0~dfsg/apps/image_archive/association.c:221:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(service->calledImplementationClassUID,
data/ctn-3.2.0~dfsg/apps/image_archive/association.c:223:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(service->calledImplementationVersionName,
data/ctn-3.2.0~dfsg/apps/image_archive/association.c:234:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(processElement->callingAPTitle, service->callingAPTitle);
data/ctn-3.2.0~dfsg/apps/image_archive/association.c:235:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(processElement->calledAPTitle, service->calledAPTitle);
data/ctn-3.2.0~dfsg/apps/image_archive/association.c:238:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(processElement->organization, ae.Organization);
data/ctn-3.2.0~dfsg/apps/image_archive/association_dummy.c:184:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(service->calledImplementationClassUID,
data/ctn-3.2.0~dfsg/apps/image_archive/association_dummy.c:186:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(service->calledImplementationVersionName,
data/ctn-3.2.0~dfsg/apps/image_archive/association_dummy.c:197:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(processElement->callingAPTitle, service->callingAPTitle);
data/ctn-3.2.0~dfsg/apps/image_archive/association_dummy.c:198:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(processElement->calledAPTitle, service->calledAPTitle);
data/ctn-3.2.0~dfsg/apps/image_archive/association_dummy.c:203:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(processElement->organization, ae.Organization);
data/ctn-3.2.0~dfsg/apps/image_archive/cget.c:255:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/image_archive/cget.c:419:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(storeRequest->classUID, queryItem->query.image.SOPClaUID);
data/ctn-3.2.0~dfsg/apps/image_archive/cget.c:420:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(storeRequest->instanceUID, queryItem->query.image.SOPInsUID);
data/ctn-3.2.0~dfsg/apps/image_archive/commit_result.c:157:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(sq->referencedSOPClassUID, sopRefRecord->SOPClaUID);
data/ctn-3.2.0~dfsg/apps/image_archive/commit_result.c:158:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(sq->referencedSOPInstanceUID, sopRefRecord->SOPInsUID);
data/ctn-3.2.0~dfsg/apps/image_archive/commit_result.c:207:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(failedSOPSeq->referencedSOPClassUID, sopRefRecord->SOPClaUID);
data/ctn-3.2.0~dfsg/apps/image_archive/commit_result.c:208:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(failedSOPSeq->referencedSOPInstanceUID, sopRefRecord->SOPInsUID);
data/ctn-3.2.0~dfsg/apps/image_archive/commit_result.c:307:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(query.image.SOPInsUID, sopRefRecord->SOPInsUID);
data/ctn-3.2.0~dfsg/apps/image_archive/commit_result.c:495:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSSTORAGECOMMITMENTPUSHMODEL);
data/ctn-3.2.0~dfsg/apps/image_archive/commit_result.c:496:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.affectedInstanceUID, DICOM_WELLKNOWNSTORAGECOMMITMENTPUSHMODEL);
data/ctn-3.2.0~dfsg/apps/image_archive/commit_result.c:581:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params->calledPresentationAddress, "%s:%-d", ae.Node, ae.Port);
data/ctn-3.2.0~dfsg/apps/image_archive/commit_result.c:582:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params->callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/image_archive/commit_result.c:583:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params->calledAPTitle, commitRequest.ReqAE);
data/ctn-3.2.0~dfsg/apps/image_archive/commit_result.c:584:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params->callingAPTitle, commitRequest.ResAE);
data/ctn-3.2.0~dfsg/apps/image_archive/copy.c:158:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(copy.Source, f->SourceApplication);
data/ctn-3.2.0~dfsg/apps/image_archive/copy.c:159:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(copy.Destination, f->ForwardingApplication);
data/ctn-3.2.0~dfsg/apps/image_archive/move.c:408:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(sendParams.callingAPTitle, params->calledAPTitle);
data/ctn-3.2.0~dfsg/apps/image_archive/move.c:409:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(sendParams.calledAPTitle, request->moveDestination);
data/ctn-3.2.0~dfsg/apps/image_archive/move.c:471:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(sendCtx.caller, params->callingAPTitle);
data/ctn-3.2.0~dfsg/apps/image_archive/move.c:472:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(sendCtx.destination, request->moveDestination);
data/ctn-3.2.0~dfsg/apps/image_archive/move.c:513:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    (void) strcpy(UIDItem->UID, queryItem->query.image.SOPInsUID);
data/ctn-3.2.0~dfsg/apps/image_archive/move.c:672:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(criteria.Title, moveDestination);
data/ctn-3.2.0~dfsg/apps/image_archive/move.c:683:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(params->calledPresentationAddress, "%s:%-d", ae.Node, ae.Port);
data/ctn-3.2.0~dfsg/apps/image_archive/move.c:741:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(criteria.Title, moveDestination);
data/ctn-3.2.0~dfsg/apps/image_archive/move.c:752:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params->calledPresentationAddress, "%s:%-d", ae.Node, ae.Port);
data/ctn-3.2.0~dfsg/apps/image_archive/naction.c:133:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(workQueue.TasNam, FIS_WQ_STORAGECOMMIT);
data/ctn-3.2.0~dfsg/apps/image_archive/naction.c:134:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(workQueue.TasID, transactionUID);
data/ctn-3.2.0~dfsg/apps/image_archive/naction.c:196:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/image_archive/naction.c:197:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->instanceUID, request->instanceUID);
data/ctn-3.2.0~dfsg/apps/image_archive/naction.c:225:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(transactionUID, storageCommit.TraUID);
data/ctn-3.2.0~dfsg/apps/image_archive/naction.c:227:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(storageCommit.ReqAE, ctx->params->callingAPTitle);
data/ctn-3.2.0~dfsg/apps/image_archive/naction.c:228:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(storageCommit.ResAE, ctx->params->calledAPTitle);
data/ctn-3.2.0~dfsg/apps/image_archive/naction.c:266:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(sopReference.TraUID, storageCommit.TraUID);
data/ctn-3.2.0~dfsg/apps/image_archive/naction.c:267:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(sopReference.SOPClaUID, ref->referencedSOPClassUID);
data/ctn-3.2.0~dfsg/apps/image_archive/naction.c:268:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(sopReference.SOPInsUID, ref->referencedSOPInstanceUID);
data/ctn-3.2.0~dfsg/apps/image_archive/naction.c:356:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/image_archive/naction.c:386:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(sq->referencedSOPClassUID, sopRefRecord->SOPClaUID);
data/ctn-3.2.0~dfsg/apps/image_archive/naction.c:387:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(sq->referencedSOPInstanceUID, sopRefRecord->SOPInsUID);
data/ctn-3.2.0~dfsg/apps/image_archive/naction.c:400:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(failedSOPSeq->referencedSOPClassUID, sopRefRecord->SOPClaUID);
data/ctn-3.2.0~dfsg/apps/image_archive/naction.c:401:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(failedSOPSeq->referencedSOPInstanceUID, sopRefRecord->SOPInsUID);
data/ctn-3.2.0~dfsg/apps/image_archive/naction.c:482:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(query.image.SOPInsUID, sopRefRecord->SOPInsUID);
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:135:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    if (sscanf(buf, "%s %d", q.title, &q.qid) != 2)
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:174:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(entry.dpnid,node);
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:202:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(entry.dpnid,node);
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:208:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(network.dpnid, node);
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:238:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(entry.dpnid,node);
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:265:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(entry.dpnid,node);
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:267:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(entry.imagefile, name);
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:295:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(entry.dpnid, node);
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:326:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(entry.dpnid, node);
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:360:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(entry.dpnid,destination);
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:376:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ctnnet.dpnid, destination);
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:410:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(entry.dpnid,destination);
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:447:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(entry.dpnid, destination);
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:480:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(entry.dpnid,destination);
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:486:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(network.dpnid, destination);
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:191:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(callingAPTitle, service->callingAPTitle);
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:437:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:883:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.patient.Owner, owner);
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:884:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.patient.GroupName, groupName);
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:885:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.patient.Priv, priv);
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:939:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.image.Path, fileName);
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:940:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.image.Transfer, transferSyntax);
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:956:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(displayedImage, fileName);
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:959:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(lastImageInAssociation, fileName);
data/ctn-3.2.0~dfsg/apps/image_archive/requests_dummy.c:405:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/image_archive/requests_dummy.c:460:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(fileName, (*request)->instanceUID);
data/ctn-3.2.0~dfsg/apps/image_archive/requests_dummy.c:587:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.patient.Owner, owner);
data/ctn-3.2.0~dfsg/apps/image_archive/requests_dummy.c:588:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.patient.GroupName, groupName);
data/ctn-3.2.0~dfsg/apps/image_archive/requests_dummy.c:589:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.patient.Priv, priv);
data/ctn-3.2.0~dfsg/apps/image_archive/requests_dummy.c:606:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.image.Path, fileName);
data/ctn-3.2.0~dfsg/apps/image_archive/requests_dummy.c:607:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.image.Transfer, transferSyntax);
data/ctn-3.2.0~dfsg/apps/image_server/association.c:170:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(service->calledImplementationClassUID,
data/ctn-3.2.0~dfsg/apps/image_server/association.c:172:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(service->calledImplementationVersionName,
data/ctn-3.2.0~dfsg/apps/image_server/association.c:183:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(processElement->callingAPTitle, service->callingAPTitle);
data/ctn-3.2.0~dfsg/apps/image_server/association.c:184:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(processElement->calledAPTitle, service->calledAPTitle);
data/ctn-3.2.0~dfsg/apps/image_server/association.c:187:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(processElement->organization, ae.Organization);
data/ctn-3.2.0~dfsg/apps/image_server/cget.c:252:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/image_server/cget.c:412:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(storeRequest->classUID, queryItem->query.image.SOPClaUID);
data/ctn-3.2.0~dfsg/apps/image_server/cget.c:413:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(storeRequest->instanceUID, queryItem->query.image.SOPInsUID);
data/ctn-3.2.0~dfsg/apps/image_server/copy.c:154:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(copy.Source, f->SourceApplication);
data/ctn-3.2.0~dfsg/apps/image_server/copy.c:155:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(copy.Destination, f->ForwardingApplication);
data/ctn-3.2.0~dfsg/apps/image_server/fillImageDB.c:208:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.image.Path, fileName);
data/ctn-3.2.0~dfsg/apps/image_server/fillImageDB.c:212:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(Insertion.image.Transfer, DICOM_TRANSFERLITTLEENDIAN);
data/ctn-3.2.0~dfsg/apps/image_server/fillImageDB.c:213:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.patient.Owner, owner);
data/ctn-3.2.0~dfsg/apps/image_server/fillImageDB.c:214:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.study.Owner, owner);
data/ctn-3.2.0~dfsg/apps/image_server/fillImageDB.c:215:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.series.Owner, owner);
data/ctn-3.2.0~dfsg/apps/image_server/fillImageDB.c:216:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.image.Owner, owner);
data/ctn-3.2.0~dfsg/apps/image_server/image_server.c:174:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(node, *argv);
data/ctn-3.2.0~dfsg/apps/image_server/image_server.c:219:6:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    fprintf(stderr, uidError, port);
data/ctn-3.2.0~dfsg/apps/image_server/image_server.c:421:12:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    (void) vfprintf(fp, controlString, args);
data/ctn-3.2.0~dfsg/apps/image_server/move.c:354:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(sendParams.callingAPTitle, params->calledAPTitle);
data/ctn-3.2.0~dfsg/apps/image_server/move.c:355:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(sendParams.calledAPTitle, request->moveDestination);
data/ctn-3.2.0~dfsg/apps/image_server/move.c:398:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    (void) strcpy(UIDItem->UID, queryItem->query.image.SOPInsUID);
data/ctn-3.2.0~dfsg/apps/image_server/move.c:543:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(criteria.Title, moveDestination);
data/ctn-3.2.0~dfsg/apps/image_server/move.c:554:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params->calledPresentationAddress, "%s:%-d", ae.Node, ae.Port);
data/ctn-3.2.0~dfsg/apps/image_server/requests.c:378:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/image_server/requests.c:539:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.patient.Owner, owner);
data/ctn-3.2.0~dfsg/apps/image_server/requests.c:540:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.patient.GroupName, groupName);
data/ctn-3.2.0~dfsg/apps/image_server/requests.c:541:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.patient.Priv, priv);
data/ctn-3.2.0~dfsg/apps/image_server/requests.c:559:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.image.Path, fileName);
data/ctn-3.2.0~dfsg/apps/image_server/requests.c:560:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Insertion.image.Transfer, transferSyntax);
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:228:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    DMAN_STORAGEACCESS access;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:233:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    memset(&access, 0, sizeof(access));
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:233:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    memset(&access, 0, sizeof(access));
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:234:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.Type = DMAN_K_STORAGEACCESS;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:238:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.Access = (S32) i;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:239:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.Flag |= DMAN_K_STORAGEACCESS_ACCESS;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:242:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    copy(access.Title, tok);
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:243:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.Flag |= DMAN_K_STORAGEACCESS_TITLE;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:246:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    copy(access.DbKey, tok);
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:247:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.Flag |= DMAN_K_STORAGEACCESS_DBKEY;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:250:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    copy(access.Owner, tok);
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:251:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.Flag |= DMAN_K_STORAGEACCESS_OWNER;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:254:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    copy(access.GroupName, tok);
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:255:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.Flag |= DMAN_K_STORAGEACCESS_GROUPNAME;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:258:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    copy(access.Comment, tok);
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:259:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.Flag |= DMAN_K_STORAGEACCESS_COMMENT;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:261:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    cond = DMAN_Insert(&dmanHandle, (DMAN_GENERICRECORD *) & access);
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:329:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    DMAN_FISACCESS access;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:334:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    memset(&access, 0, sizeof(access));
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:334:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    memset(&access, 0, sizeof(access));
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:335:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.Type = DMAN_K_FISACCESS;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:339:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.Access = (S32) i;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:340:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.Flag |= DMAN_K_FISACCESS_ACCESS;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:343:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    copy(access.Title, tok);
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:344:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.Flag |= DMAN_K_FISACCESS_TITLE;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:347:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    copy(access.DbKey, tok);
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:348:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.Flag |= DMAN_K_FISACCESS_DBKEY;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:351:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    copy(access.Owner, tok);
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:352:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.Flag |= DMAN_K_FISACCESS_OWNER;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:355:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    copy(access.GroupName, tok);
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:356:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.Flag |= DMAN_K_FISACCESS_GROUPNAME;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:359:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    copy(access.Comment, tok);
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:360:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.Flag |= DMAN_K_FISACCESS_COMMENT;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:362:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    cond = DMAN_Insert(&dmanHandle, (DMAN_GENERICRECORD *) & access);
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:494:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    DMAN_STORAGEACCESS access;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:497:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    memset(&access, 0, sizeof(access));
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:497:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    memset(&access, 0, sizeof(access));
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:498:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.Type = DMAN_K_STORAGEACCESS;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:500:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    cond = DMAN_Delete(&dmanHandle, (DMAN_GENERICRECORD *) & access);
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:539:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    DMAN_FISACCESS access;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:542:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    memset(&access, 0, sizeof(access));
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:542:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    memset(&access, 0, sizeof(access));
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:543:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.Type = DMAN_K_FISACCESS;
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:545:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    cond = DMAN_Delete(&dmanHandle, (DMAN_GENERICRECORD *) & access);
data/ctn-3.2.0~dfsg/apps/mb_query/mb_query.c:531:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(params.calledPresentationAddress, "%s:%s", node, *argv);
data/ctn-3.2.0~dfsg/apps/mb_query/mb_query.c:532:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(params.callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/mb_query/mb_query.c:533:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(params.calledAPTitle, calledAPTitle);
data/ctn-3.2.0~dfsg/apps/mb_query/mb_query.c:534:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(params.callingAPTitle, callingAPTitle);
data/ctn-3.2.0~dfsg/apps/mb_xlate_test/mb_xlate_test.c:130:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(imageCharSet, specificCharSet);
data/ctn-3.2.0~dfsg/apps/mwlQuery/mwlQuery.c:248:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params.calledPresentationAddress, "%s:%s", node, *argv);
data/ctn-3.2.0~dfsg/apps/mwlQuery/mwlQuery.c:249:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/mwlQuery/mwlQuery.c:250:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.calledAPTitle, calledAPTitle);
data/ctn-3.2.0~dfsg/apps/mwlQuery/mwlQuery.c:251:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingAPTitle, callingAPTitle);
data/ctn-3.2.0~dfsg/apps/object_viewer/UxMethod.c:231:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Names[NumNames], name);
data/ctn-3.2.0~dfsg/apps/object_viewer/format.c:77:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void) sprintf(buff, "%-32s", ieIE->ieDescription);
data/ctn-3.2.0~dfsg/apps/object_viewer/format.c:100:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void) sprintf(buff, "%-48s", ieModule->moduleDescription);
data/ctn-3.2.0~dfsg/apps/object_viewer/format.c:133:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void) sprintf(buff, "%-64s", ieAttr->element.description);
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:221:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(bname, "File Selected:  %s", filename);
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:356:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(info, buff);
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:358:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(info, mes);
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:705:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf1, " %s", atname);
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:730:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(buf2, "%04x,  %04x,   %s", gg, ee, ieAttr->element.d.string);
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex1_initiator.c:196:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params.calledPresentationAddress, "%s:%s", node, port);
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex1_initiator.c:197:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex1_initiator.c:198:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.calledAPTitle, calledAPTitle);
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex1_initiator.c:199:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingAPTitle, callingAPTitle);
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex2_initiator.c:192:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params.calledPresentationAddress, "%s:%s", node, port);
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex2_initiator.c:193:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex2_initiator.c:194:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.calledAPTitle, calledAPTitle);
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex2_initiator.c:195:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingAPTitle, callingAPTitle);
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex3_acceptor.c:193:6:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    fprintf(stderr, errmsg, port);
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex3_acceptor.c:215:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(service.calledImplementationClassUID,
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex3_acceptor.c:217:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(service.calledImplementationVersionName,
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex3_acceptor.c:474:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, msg, messageType);
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex3_initiator.c:195:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params.calledPresentationAddress, "%s:%s", node, port);
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex3_initiator.c:196:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex3_initiator.c:197:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.calledAPTitle, calledAPTitle);
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex3_initiator.c:198:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingAPTitle, callingAPTitle);
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex4_acceptor.c:229:6:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    fprintf(stderr, errmsg, port);
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex4_acceptor.c:251:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(service.calledImplementationClassUID,
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex4_acceptor.c:253:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(service.calledImplementationVersionName,
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex4_initiator.c:196:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params.calledPresentationAddress, "%s:%s", node, port);
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex4_initiator.c:197:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex4_initiator.c:198:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.calledAPTitle, calledAPTitle);
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex4_initiator.c:199:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingAPTitle, callingAPTitle);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/UxMethod.c:231:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Names[NumNames], name);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/association.c:141:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params->calledPresentationAddress, "%s:%-d", ae.Node,
data/ctn-3.2.0~dfsg/apps/pmgr_motif/association.c:143:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params->calledAPTitle, ae.Title);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/association.c:144:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params->callingAPTitle, callingApplication);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:193:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fb->imageDisplayFormat, "%s\\%-d,%-d", STANDARD, c1, r1);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:198:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->filmOrientation, PORTRAIT);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:200:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->filmOrientation, LANDSCAPE);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:207:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->filmSizeID, SIZE8INX10IN);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:209:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->filmSizeID, SIZE10INX12IN);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:211:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->filmSizeID, SIZE10INX14IN);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:213:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->filmSizeID, SIZE11INX14IN);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:215:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->filmSizeID, SIZE14INX14IN);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:217:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->filmSizeID, SIZE14INX17IN);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:219:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->filmSizeID, SIZE24CMX24CM);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:221:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->filmSizeID, SIZE24CMX30CM);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:229:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->magnificationType, REPLICATE);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:231:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->magnificationType, BILINEAR);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:233:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->magnificationType, CUBIC);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:235:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->magnificationType, NONE);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:246:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->trim, YES);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:249:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->trim, NO);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:302:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->emptyImageDensity, BLACK);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:305:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->emptyImageDensity, WHITE);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:326:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->borderDensity, BLACK);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:329:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fb->borderDensity, WHITE);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:723:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(filmBox.referencedFilmSessionSOPClassUID, DICOM_SOPCLASSBASICFILMSESSION);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:724:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(filmBox.referencedFilmSessionSOPInstanceUID, filmSessionSOPInstanceUID);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:168:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(f->priority, LOW);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:170:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(f->priority, MED);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:172:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(f->priority, HIGH);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:175:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(f->mediumType, PAPER);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:177:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(f->mediumType, CLEAR_FILM);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:179:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(f->mediumType, BLUE_FILM);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:182:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(f->filmDestination, MAGAZINE);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:184:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(f->filmDestination, PROCESSOR);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:367:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(filmSessionSOPInstanceUID,
data/ctn-3.2.0~dfsg/apps/pmgr_motif/format.c:87:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buffer, g->Title);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/format.c:112:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void) sprintf(buf, "%-64s", e->combo);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/get_patientList.c:169:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(item->AccessionNumber, study.AccessionNumber);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/get_patientList.c:170:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(item->combo, study.AccessionNumber);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/get_patientList.c:172:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(item->combo, item->PatientName);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/get_patientList.c:220:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(Name, "%s %s %s", first, middle, last);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:355:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(temp, icons[idx / 8][idx % 8].UID);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:416:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(bib[selected_bib / 8][selected_bib % 8].UID,
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:827:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(icons[idx / 8][idx % 8].UID, icon_item->studyicon.UID);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:1010:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(bib[i][j].bib.imageBoxSOPClassUID, refPrint->refSOPClassUID);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:1011:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(bib[i][j].bib.imageBoxSOPInstanceUID,
data/ctn-3.2.0~dfsg/apps/pmgr_motif/pmgr_motif.c:189:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(applicationTitle, *argv);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:150:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(params->applicationContextName, DICOM_STDAPPLICATIONCONTEXT);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:164:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(params->callingImplementationClassUID,
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:166:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(params->callingImplementationVersionName,
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:238:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(SOPClass, DICOM_SOPCLASSGREYSCALEPRINTMGMTMETA);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:247:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(SOPClass, DICOM_SOPCLASSCOLORPRINTMGMTMETA);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:255:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(SOPClass, DICOM_SOPCLASSPRINTJOB);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:326:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, STANDARD);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:328:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, ROW);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:330:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, COL);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:332:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, SLIDE);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:334:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, SUPERSLIDE);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:336:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, CUSTOM);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:695:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSPRINTER);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:696:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.requestedInstanceUID, DICOM_SOPPRINTERINSTANCE);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:825:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSBASICFILMSESSION);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:921:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr, fatal);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:942:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfsAttrib->filmSessionSOPInstanceUID,
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1005:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSBASICFILMBOX);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1128:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfbAttrib->filmBoxSOPClassUID, DICOM_SOPCLASSBASICFILMBOX);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1138:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr, fatal);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1141:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfbAttrib->filmBoxSOPInstanceUID,
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1217:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSBASICGREYSCALEIMAGEBOX);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1218:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.instanceUID, imageBox->imageBoxSOPInstanceUID);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1326:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(imageBox.imageBoxSOPClassUID,
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1328:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(imageBox.imageBoxSOPInstanceUID,
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1348:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(imageBox.polarity,
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1352:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(imageBox.magnificationType,
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1356:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(imageBox.smoothingType,
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1360:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(imageBox.requestedImageSize,
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1428:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSBASICFILMBOX);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1429:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.instanceUID, filmBox->filmBoxSOPInstanceUID);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1510:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(filmBox->refPrintJobClassUID,
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1512:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(filmBox->refPrintJobInstanceUID,
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1570:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, classUID);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1571:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.instanceUID, instanceUID);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1687:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(query.Image.ImageUID, imageUID);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/selectPrinterDialog.c:167:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(criteria.GroupName, serverGroup);
data/ctn-3.2.0~dfsg/apps/print_clients/Fields.c:262:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fld->storage, fld->rbtns[i].btns.rblbl->data);
data/ctn-3.2.0~dfsg/apps/print_clients/Fields.c:265:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fld->storage, fld->rbtns[i].btns.rbtf->data);
data/ctn-3.2.0~dfsg/apps/print_clients/Fields.c:268:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fld->storage, fld->rbtns[i].btns.rb2tf->data);
data/ctn-3.2.0~dfsg/apps/print_clients/Fields.c:534:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(fld->storage, fld->rbtns[i].btns.rblbl->data);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:158:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(params->applicationContextName, DICOM_STDAPPLICATIONCONTEXT);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:172:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(params->callingImplementationClassUID,
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:174:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(params->callingImplementationVersionName,
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:218:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(SOPClass, DICOM_SOPCLASSGREYPRINTMGMTMETA);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:227:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(SOPClass, DICOM_SOPCLASSCOLORPRINTMGMTMETA);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:235:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(SOPClass, DICOM_SOPCLASSPRINTJOB);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:474:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, STANDARD);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:476:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, ROW);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:478:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, COL);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:480:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, SLIDE);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:482:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, SUPERSLIDE);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:484:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, CUSTOM);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:614:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSPRINTER);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:615:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.requestedInstanceUID, DICOM_SOPPRINTERINSTANCE);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:834:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSBASICFILMSESSION);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:900:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfsInstanceUID, createResponse->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:974:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(bfbAttrib.referencedParentFilmSessionUID, bfsInstanceUID);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:983:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSBASICFILMBOX);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:1013:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfbInstanceUID, response->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:1112:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request->classUID, DICOM_SOPCLASSBASICIMAGEBOX);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:1113:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request->instanceUID, uid);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:1214:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request->classUID, responseFilmBox->classUID);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:1215:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request->instanceUID, responseFilmBox->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:1299:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request->classUID, classUID);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:1300:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request->instanceUID, instanceUID);
data/ctn-3.2.0~dfsg/apps/print_clients/display_error.c:321:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(displayStr, name);
data/ctn-3.2.0~dfsg/apps/print_clients/display_error.c:323:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(displayStr, op);
data/ctn-3.2.0~dfsg/apps/print_clients/display_error.c:325:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(displayStr, statDesc[idx].description);
data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.c:352:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(temp, icons[idx / 8][idx % 8].UID);
data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.c:392:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(bib[selected_bib / 8][selected_bib % 8].UID,
data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.c:724:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(icons[idx / 8][idx % 8].UID, icon_item->studyicon.UID);
data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.c:1141:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(bib[i][j].bib.imageBoxSOPClassUID, refPrint->refSOPClassUID);
data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.c:1142:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(bib[i][j].bib.imageBoxSOPInstanceUID,
data/ctn-3.2.0~dfsg/apps/print_clients/display_study.c:185:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(Name, "%s %s %s", first, middle, last);
data/ctn-3.2.0~dfsg/apps/print_clients/display_study.c:299:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(item->AccessionNumber, study.AccessionNumber);
data/ctn-3.2.0~dfsg/apps/print_clients/display_study.c:300:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(item->combo, study.AccessionNumber);
data/ctn-3.2.0~dfsg/apps/print_clients/display_study.c:302:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(item->combo, item->PatientName);
data/ctn-3.2.0~dfsg/apps/print_clients/print_callback.c:141:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfsInstanceUID, createResponse->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_clients/print_callback.c:142:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfsAttrib->filmSessionSOPInstanceUID, createResponse->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_clients/print_callback.c:180:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfbInstanceUID, createResponse->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:201:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(format, *argv);
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:248:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:249:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params.calledPresentationAddress, "%s:%s", node, port);
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:250:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.calledAPTitle, calledAPTitle);
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:251:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingAPTitle, callingAPTitle);
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:435:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(filmBox.imageDisplayFormat, format);
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:446:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(SOPClass, SOPClassArray[0]);
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:491:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(filmBox.referencedFilmSessionSOPClassUID,
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:493:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(filmBox.referencedFilmSessionSOPInstanceUID,
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:537:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(imageBox.imageBoxSOPClassUID, refPrint->refSOPClassUID);
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:538:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(imageBox.imageBoxSOPInstanceUID, refPrint->refSOPInstanceUID);
data/ctn-3.2.0~dfsg/apps/print_clients/print_client_private.c:216:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(bfbAttrib.imageDisplayFormat, format);
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:428:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params.calledPresentationAddress, "%s:%s",
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:431:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:432:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.calledAPTitle, calledAPTitle);
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:433:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingAPTitle, callingAPTitle);
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:445:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(SOPClass, SOPClassList[0]);
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:627:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(bfbAttrib.referencedFilmSessionSOPClassUID,
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:629:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(bfbAttrib.referencedFilmSessionSOPInstanceUID,
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:657:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(bfbAttrib.imageDisplayFormat, "%s\\%s,%s", STANDARD, bfbstdCOL, bfbstdROW);
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:670:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(bfbAttrib.borderDensity, borderDensityC);
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:680:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(bfbAttrib.emptyImageDensity, emptyImageDensityC);
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:688:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfbAttrib.minDensity, minDensityC);
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:699:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfbAttrib.maxDensity, maxDensityC);
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr_private.c:130:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfsInstanceUID, createResponse->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_clients/print_query.c:215:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/print_clients/print_query.c:216:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params.calledPresentationAddress, "%s:%s", node, port);
data/ctn-3.2.0~dfsg/apps/print_clients/print_query.c:217:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.calledAPTitle, calledAPTitle);
data/ctn-3.2.0~dfsg/apps/print_clients/print_query.c:218:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingAPTitle, callingAPTitle);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:160:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(params->applicationContextName, DICOM_STDAPPLICATIONCONTEXT);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:174:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(params->callingImplementationClassUID,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:176:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(params->callingImplementationVersionName,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:248:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(SOPClass, DICOM_SOPCLASSGREYSCALEPRINTMGMTMETA);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:257:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(SOPClass, DICOM_SOPCLASSCOLORPRINTMGMTMETA);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:265:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(SOPClass, DICOM_SOPCLASSPRINTJOB);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:336:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, STANDARD);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:338:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, ROW);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:340:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, COL);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:342:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, SLIDE);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:344:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, SUPERSLIDE);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:346:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, CUSTOM);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:706:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSPRINTER);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:707:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.requestedInstanceUID, DICOM_SOPPRINTERINSTANCE);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:708:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.requestedInstanceUID, DICOM_SOPPRINTERINSTANCE);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:837:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSBASICFILMSESSION);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:942:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(filmSession.filmSessionSOPInstanceUID,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:959:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmSession.copies,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:963:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmSession.priority,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:967:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmSession.mediumType,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:971:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmSession.filmDestination,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:975:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmSession.filmSessionLabel,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:979:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmSession.memoryAllocation,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1054:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSBASICFILMBOX);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1171:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(filmBox.filmBoxSOPClassUID, createResponse->classUID);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1172:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(filmBox.filmBoxSOPInstanceUID,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1189:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmBox.imageDisplayFormat,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1193:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmBox.annotationDisplayFormatID,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1197:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmBox.filmOrientation,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1201:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmBox.filmSizeID,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1205:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmBox.magnificationType,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1209:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmBox.smoothingType,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1213:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmBox.borderDensity,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1217:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmBox.emptyImageDensity,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1222:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmBox.minDensity, bfbAttrib->minDensity);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1225:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmBox.maxDensity, bfbAttrib->maxDensity);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1236:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmBox.trim,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1240:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmBox.configurationInfo,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1244:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmBox.referencedFilmSessionSOPClassUID,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1246:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmBox.referencedFilmSessionSOPInstanceUID,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1256:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmBox.refPrintJobClassUID,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1258:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(filmBox.refPrintJobInstanceUID,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1339:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSBASICGREYSCALEIMAGEBOX);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1340:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.instanceUID, imageBox->imageBoxSOPInstanceUID);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1451:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(imageBox.imageBoxSOPClassUID,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1453:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(imageBox.imageBoxSOPInstanceUID,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1473:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(imageBox.polarity,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1477:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(imageBox.magnificationType,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1481:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(imageBox.smoothingType,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1486:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(imageBox.magnificationFactor,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1490:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(imageBox.imageBoxSOPClassUID,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1495:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    (void) strcpy(imageBox.requestedImageSize,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1564:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSBASICFILMBOX);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1565:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.instanceUID, filmBox->filmBoxSOPInstanceUID);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1647:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(filmBox->refPrintJobClassUID,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1649:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(filmBox->refPrintJobInstanceUID,
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1707:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, classUID);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1708:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.instanceUID, instanceUID);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1824:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(query.Image.ImageUID, imageUID);
data/ctn-3.2.0~dfsg/apps/print_server/action.c:178:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(nactionResponse->classUID, nactionRequest->classUID);
data/ctn-3.2.0~dfsg/apps/print_server/action.c:179:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(nactionResponse->instanceUID, nactionRequest->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/action.c:202:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(filmBox.refPrintJobClassUID, DICOM_SOPCLASSPRINTJOB);
data/ctn-3.2.0~dfsg/apps/print_server/action.c:265:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(gqElement.instanceUID, bfbInstance->bfbInstanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/association.c:155:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(service->calledImplementationClassUID,
data/ctn-3.2.0~dfsg/apps/print_server/association.c:157:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(service->calledImplementationVersionName,
data/ctn-3.2.0~dfsg/apps/print_server/association.c:583:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(criteria.RequestingTitle, params->callingAPTitle);
data/ctn-3.2.0~dfsg/apps/print_server/association.c:584:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(criteria.RespondingTitle, params->calledAPTitle);
data/ctn-3.2.0~dfsg/apps/print_server/create.c:237:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ncreateResponse->classUID, ncreateRequest->classUID);
data/ctn-3.2.0~dfsg/apps/print_server/create.c:265:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ncreateResponse->instanceUID, ncreateRequest->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/create.c:270:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfsPtr->filmSessionSOPClassUID, ncreateResponse->classUID);
data/ctn-3.2.0~dfsg/apps/print_server/create.c:271:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfsPtr->filmSessionSOPInstanceUID,
data/ctn-3.2.0~dfsg/apps/print_server/create.c:343:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(bfsInstance.bfsInstanceUID, ncreateResponse->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/create.c:360:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(gqElement.instanceUID, bfsInstance.bfsInstanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/create.c:363:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(gqElement.objFile, fileName);
data/ctn-3.2.0~dfsg/apps/print_server/create.c:511:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ncreateResponse->classUID, ncreateRequest->classUID);
data/ctn-3.2.0~dfsg/apps/print_server/create.c:538:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ncreateResponse->instanceUID, ncreateRequest->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/create.c:545:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfbPtr->filmBoxSOPClassUID, ncreateRequest->classUID);
data/ctn-3.2.0~dfsg/apps/print_server/create.c:546:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfbPtr->filmBoxSOPInstanceUID, ncreateResponse->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/create.c:624:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfbInstance->bfbInstanceUID, ncreateResponse->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/create.c:728:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(gqElement.instanceUID, bfbInstance->bfbInstanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/create.c:731:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(gqElement.objFile, fileName);
data/ctn-3.2.0~dfsg/apps/print_server/create.c:833:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(refItem->refSOPClassUID, DICOM_SOPCLASSBASICGREYSCALEIMAGEBOX);
data/ctn-3.2.0~dfsg/apps/print_server/create.c:835:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(refItem->refSOPClassUID, presentationCtx->abstractSyntax);
data/ctn-3.2.0~dfsg/apps/print_server/create.c:847:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bibInstance->bibInstanceUID, refItem->refSOPInstanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/delete.c:150:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ndeleteResponse->classUID, ndeleteRequest->classUID);
data/ctn-3.2.0~dfsg/apps/print_server/delete.c:151:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ndeleteResponse->instanceUID, ndeleteRequest->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/delete.c:168:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    (void) strcpy(gqElement.instanceUID,
data/ctn-3.2.0~dfsg/apps/print_server/get.c:258:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ngetResponse->classUID, ngetRequest->classUID);
data/ctn-3.2.0~dfsg/apps/print_server/get.c:259:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ngetResponse->affectedInstanceUID,
data/ctn-3.2.0~dfsg/apps/print_server/passociation.c:155:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(service->calledImplementationClassUID,
data/ctn-3.2.0~dfsg/apps/print_server/passociation.c:157:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(service->calledImplementationVersionName,
data/ctn-3.2.0~dfsg/apps/print_server/passociation.c:583:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(criteria.RequestingTitle, params->callingAPTitle);
data/ctn-3.2.0~dfsg/apps/print_server/passociation.c:584:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(criteria.RespondingTitle, params->calledAPTitle);
data/ctn-3.2.0~dfsg/apps/print_server/prequests.c:356:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/print_server/print_server.c:180:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(node, *argv);
data/ctn-3.2.0~dfsg/apps/print_server/print_server.c:473:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(e->callingAPTitle, service->callingAPTitle);
data/ctn-3.2.0~dfsg/apps/print_server/print_server.c:474:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(e->calledAPTitle, service->calledAPTitle);
data/ctn-3.2.0~dfsg/apps/print_server/requests.c:356:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:273:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(nsetResponse->classUID, nsetRequest->classUID);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:274:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(nsetResponse->instanceUID, nsetRequest->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:284:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bibPtr->imageBoxSOPClassUID, nsetRequest->classUID);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:285:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bibPtr->imageBoxSOPInstanceUID, nsetRequest->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:367:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(gqElement.instanceUID, bibNode->bibInstanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:370:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(gqElement.objFile, fileName);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:483:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(nsetResponse->classUID, nsetRequest->classUID);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:484:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(nsetResponse->instanceUID, nsetRequest->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:497:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(nsetResponse->requestedClassUID, nsetRequest->classUID);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:498:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(nsetResponse->requestedInstanceUID, nsetRequest->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:505:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfsPtr->filmSessionSOPClassUID, nsetResponse->classUID);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:506:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfsPtr->filmSessionSOPInstanceUID,
data/ctn-3.2.0~dfsg/apps/print_server/set.c:570:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(bfsInstance.bfsInstanceUID, nsetResponse->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:578:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(gqElement.instanceUID, bfsInstance.bfsInstanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:581:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(gqElement.objFile, fileName);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:695:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(nsetResponse->classUID, nsetRequest->classUID);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:707:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfbPtr->filmBoxSOPClassUID, nsetRequest->classUID);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:708:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfbPtr->filmBoxSOPInstanceUID, nsetResponse->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:786:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(bfbInstance->bfbInstanceUID, nsetResponse->instanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:890:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(gqElement.instanceUID, bfbInstance->bfbInstanceUID);
data/ctn-3.2.0~dfsg/apps/print_server/set.c:893:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(gqElement.objFile, fileName);
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:123:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, STANDARD);
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:125:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, ROW);
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:127:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, COL);
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:129:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, SLIDE);
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:131:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, SUPERSLIDE);
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:133:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imgDisplay->displayFormat, CUSTOM);
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:635:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(elem.objFile, KILL_DISPLAY);
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:689:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(*flagName, args[argno - 1]);
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:749:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(event->errorComment,
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:758:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(get->errorComment,
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:767:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(set->errorComment,
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:776:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(action->errorComment,
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:785:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(create->errorComment,
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:794:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(delete->errorComment,
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:731:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(request->copies, copies[0].copies);
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:748:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(request->priority, priority[0].priority);
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:765:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(request->mediumType, mediumType[0].mediumType);
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:783:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(request->filmDestination,
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:802:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(request->filmSessionLabel,
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:821:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(request->memoryAllocation,
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:956:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(request->annotationDisplayFormatID,
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:976:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(request->filmOrientation,
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:994:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(request->filmSizeID, filmSizeID[0].filmSizeID);
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1012:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(request->magnificationType,
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1031:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(request->smoothingType,
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1050:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(request->borderDensity,
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1069:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(request->emptyImageDensity,
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1124:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(request->trim, trim[0].trim);
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1142:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(request->configurationInfo,
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1311:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(request->polarity, polarity[0].polarity);
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1329:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(request->magnificationType,
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1348:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(request->smoothingType,
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1367:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(request->requestedImageSize,
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1437:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(request->copies, copies[0].copies);
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1443:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(request->priority, priority[0].priority);
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1450:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(request->mediumType, mediumType[0].mediumType);
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1457:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(request->filmDestination,
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1525:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(request->filmOrientation,
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1533:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(request->filmSizeID, filmSizeID[0].filmSizeID);
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1540:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(request->magnificationType,
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1548:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(request->configurationInfo,
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1599:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(request->polarity,
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1645:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(request->polarity,
data/ctn-3.2.0~dfsg/apps/print_server_display/display_prn.c:477:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(img->filename, filename);
data/ctn-3.2.0~dfsg/apps/print_server_display/display_prn.c:558:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(box->UID, UID);
data/ctn-3.2.0~dfsg/apps/print_server_display/display_prn.c:574:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(box->filename, filename);
data/ctn-3.2.0~dfsg/apps/print_server_display/display_prn.c:650:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(session->UID, UID);
data/ctn-3.2.0~dfsg/apps/print_server_display/display_prn.c:651:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(session->filename, filename);
data/ctn-3.2.0~dfsg/apps/print_server_display/print_server_display.c:91:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(elem.objFile, KILL_DISPLAY);
data/ctn-3.2.0~dfsg/apps/print_server_display/print_server_display.c:243:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(temp, element.instanceUID);
data/ctn-3.2.0~dfsg/apps/query_client/UxMethod.c:231:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Names[NumNames], name);
data/ctn-3.2.0~dfsg/apps/query_client/format.c:16:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void) sprintf(buf, "%-16s %-30s %-12s", patient->PatientID,
data/ctn-3.2.0~dfsg/apps/query_client/format.c:25:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void) sprintf(buf, "%-16s %-16s %-10s", study->AccessionNumber,
data/ctn-3.2.0~dfsg/apps/query_client/format.c:33:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(buf, study->SeriesModalities[i]);
data/ctn-3.2.0~dfsg/apps/query_client/patient_query.c:185:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params.calledPresentationAddress, "%s:%s", node, port);
data/ctn-3.2.0~dfsg/apps/query_client/patient_query.c:186:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/query_client/patient_query.c:187:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.calledAPTitle, calledAPTitle);
data/ctn-3.2.0~dfsg/apps/query_client/patient_query.c:188:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingAPTitle, callingAPTitle);
data/ctn-3.2.0~dfsg/apps/query_client/patient_query.c:236:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPPATIENTQUERY_FIND);
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:168:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params.calledPresentationAddress, "%s:%s", connection->NodeName,
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:170:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:171:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.calledAPTitle, connection->CalledAPTitle);
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:172:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingAPTitle, connection->CallingAPTitle);
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:257:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPPATIENTQUERY_FIND);
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:329:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patient.PatientName, patient.LastName);
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:430:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params.calledPresentationAddress, "%s:%s", connection->NodeName,
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:432:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:433:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.calledAPTitle, connection->CalledAPTitle);
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:434:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingAPTitle, connection->CallingAPTitle);
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:455:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(studyModule->SeriesModalities[i], seriesModule->Modality);
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:493:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPPATIENTQUERY_FIND);
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:622:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPPATIENTQUERY_FIND);
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:668:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patient.PatientID, patientModule->PatientID);
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:669:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(study.StudyInstanceUID, studyModule->StudyInstanceUID);
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:748:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params.calledPresentationAddress, "%s:%s", connection->NodeName,
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:750:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:751:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.calledAPTitle, connection->CalledAPTitle);
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:752:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingAPTitle, connection->CallingAPTitle);
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:788:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPPATIENTQUERY_MOVE);
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:789:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.moveDestination, destinationAPTitle);
data/ctn-3.2.0~dfsg/apps/query_client/topLevelShell1.c:128:12:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    (void) sscanf(t, "%s", txt);
data/ctn-3.2.0~dfsg/apps/ris_gateway/association.c:111:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(service->calledImplementationClassUID,
data/ctn-3.2.0~dfsg/apps/ris_gateway/association.c:113:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(service->calledImplementationVersionName,
data/ctn-3.2.0~dfsg/apps/ris_gateway/association.c:520:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params->calledPresentationAddress, "%s:%-d", ae.Node, ae.Port);
data/ctn-3.2.0~dfsg/apps/ris_gateway/association.c:521:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params->calledAPTitle, ae.Title);
data/ctn-3.2.0~dfsg/apps/ris_gateway/association.c:522:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params->callingAPTitle, local);
data/ctn-3.2.0~dfsg/apps/ris_gateway/association.c:524:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params->callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/ris_gateway/event.c:196:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(e->r.study.StuInsUID, request->affectedInstanceUID);
data/ctn-3.2.0~dfsg/apps/ris_gateway/event.c:202:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(e->r.results.ResUID, request->affectedInstanceUID);
data/ctn-3.2.0~dfsg/apps/ris_gateway/event.c:208:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(e->r.interpretation.IntUID, request->affectedInstanceUID);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:95:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSDETACHEDPATIENTMGMT);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:96:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.requestedInstanceUID, uid);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:129:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSDETACHEDSTUDYMGMT);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:130:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.requestedInstanceUID, uid);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:164:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSSTUDYCOMPONENTMGMT);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:165:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.requestedInstanceUID, uid);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:201:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSDETACHEDRESULTSMGMT);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:202:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.requestedInstanceUID, uid);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:218:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSDETACHEDRESULTSMGMT);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:219:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.requestedInstanceUID, uid);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:253:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSDETACHEDINTERPRETMGMT);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:254:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.requestedInstanceUID, uid);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:297:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(series->StuComUID, sc->StuComUID);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:306:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    (void) strcpy(image->StuComUID, sc->StuComUID);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:340:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(interp.IntUID, interpPtr->IntUID);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:341:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(interp.ResUID, results->ResUID);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:378:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patient.PatUID, study.PatUID);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:383:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(study.StuInsUID, e->r.study.StuInsUID);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:435:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(results.StuInsUID, e->r.study.StuInsUID);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:436:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(results.ResUID, resultsPtr->ResUID);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:459:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(studyComponent.StuComUID, scPtr->StuComUID);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:469:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patient.PatUID, study.PatUID);
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:473:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(study.StuInsUID, e->r.study.StuInsUID);
data/ctn-3.2.0~dfsg/apps/ris_gateway/requests.c:117:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(localApplication, service->calledAPTitle);
data/ctn-3.2.0~dfsg/apps/ris_gateway/requests.c:118:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(remoteApplication, service->callingAPTitle);
data/ctn-3.2.0~dfsg/apps/ris_gateway/requests.c:312:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/ris_gateway/ris_gateway.c:125:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(node, *argv);
data/ctn-3.2.0~dfsg/apps/ris_gateway/ris_gateway.c:157:6:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    fprintf(stderr, uidError, port);
data/ctn-3.2.0~dfsg/apps/ris_gateway/ris_gateway.c:250:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(e->callingAPTitle, service->callingAPTitle);
data/ctn-3.2.0~dfsg/apps/ris_gateway/ris_gateway.c:251:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(e->calledAPTitle, service->calledAPTitle);
data/ctn-3.2.0~dfsg/apps/rsa_ui/UxMethod.c:231:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Names[NumNames], name);
data/ctn-3.2.0~dfsg/apps/rsa_ui/format.c:78:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void) sprintf(buf, "%-16s %-30s", p->PatID, p->PatNam);
data/ctn-3.2.0~dfsg/apps/rsa_ui/format.c:97:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void) sprintf(buf, "%-16s %-16s %-8s %-16s %-16s",
data/ctn-3.2.0~dfsg/apps/rsa_ui/format.c:121:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void) sprintf(buf, "%-30s %-16s %2d-%-3s-%04d",
data/ctn-3.2.0~dfsg/apps/rsa_ui/format.c:125:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void) sprintf(buf, "%-30s %-16s %-11s ",
data/ctn-3.2.0~dfsg/apps/rsa_ui/format.c:131:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(buf, ps->Study.ProDes);
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:132:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(p2, f);
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:134:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(p2, item->path);
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:143:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p->path, f);
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:288:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(xferSyntaxBuf, UID_Translate(*argv));
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:318:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params.calledPresentationAddress, "%s:%s", node, port);
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:319:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:320:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.calledAPTitle, calledAPTitle);
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:321:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingAPTitle, callingAPTitle);
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:343:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(uid, sopInstanceUID);
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:580:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(lastSOPClass, SOPClass);
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:646:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, SOPClass);
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:647:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.instanceUID, instanceUID);
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:648:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.moveAETitle, moveAETitle);
data/ctn-3.2.0~dfsg/apps/send_results/association.c:172:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(criteria.Title, moveDestination);
data/ctn-3.2.0~dfsg/apps/send_results/association.c:180:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params->calledPresentationAddress, "%s:%-d", ae.Node, ae.Port);
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:79:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p->callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:111:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patientName, query->patient.PatNam);
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:112:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patientID, query->patient.PatID);
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:113:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(accessionNumber, query->study.AccNum);
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:114:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(studyInstanceUID, query->study.StuInsUID);
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:115:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(seriesInstanceUID, query->series.SerInsUID);
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:116:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(sopInstanceUID, query->image.SOPInsUID);
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:404:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(recs.patient.PatID, patientID);
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:408:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(recs.study.StuInsUID, studyInstanceUID);
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:412:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(recs.study.AccNum, accessionNumber);
data/ctn-3.2.0~dfsg/apps/send_study/association.c:172:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(criteria.Title, moveDestination);
data/ctn-3.2.0~dfsg/apps/send_study/association.c:180:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params->calledPresentationAddress, "%s:%-d", ae.Node, ae.Port);
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:82:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p->callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:151:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patientName, query->patient.PatNam);
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:152:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(patientID, query->patient.PatID);
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:153:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(accessionNumber, query->study.AccNum);
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:154:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(studyInstanceUID, query->study.StuInsUID);
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:155:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(seriesInstanceUID, query->series.SerInsUID);
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:156:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(sopInstanceUID, query->image.SOPInsUID);
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:228:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(request.moveAETitle, moveAETitle);
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:275:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params->callingAPTitle, callingAETitle);
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:276:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params->calledAPTitle, destinationAETitle);
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:488:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(recs.patient.PatID, patientID);
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:492:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(recs.study.StuInsUID, studyInstanceUID);
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:496:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(recs.study.AccNum, accessionNumber);
data/ctn-3.2.0~dfsg/apps/simple_pacs/simple_pacs.c:229:6:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    fprintf(stderr, errmsg, port);
data/ctn-3.2.0~dfsg/apps/simple_pacs/simple_pacs.c:251:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(service.calledImplementationClassUID,
data/ctn-3.2.0~dfsg/apps/simple_pacs/simple_pacs.c:253:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(service.calledImplementationVersionName,
data/ctn-3.2.0~dfsg/apps/simple_pacs/simple_pacs.c:585:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:327:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(s->namingConvention, namingConvention);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:682:6:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    fprintf(stderr, errmsg, port);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:712:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(service->calledImplementationClassUID,
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:714:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(service->calledImplementationVersionName,
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1153:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1222:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(txt, "%c %x %x %s", &c, &group, &element, defaultText);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1228:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(path, defaultText);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1236:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(path, defaultText);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1245:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(path, defaultText);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1247:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(path, p);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1256:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(txt, "%c %s", &c, localText);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1257:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(path, localText);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1325:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(newDirectory, baseDirectory);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1331:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(newDirectory, params->callingAPTitle);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1334:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(newDirectory, params->calledAPTitle);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1356:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(newName, "%s%s", newDirectory, tempName);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1480:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(directory, "%s/%s", baseDirectory, directoryMap[index].directory);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1483:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(fileName, "%s/%s", directory, (*request)->instanceUID);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1487:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(fileName, "%s", (*request)->instanceUID);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1848:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(UIDItem->UID, q->Image.ImageUID);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1965:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(q->Series.Modality, l[index]);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1966:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(q->Image.ClassUID, classes[index]);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1967:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(q->Image.ImageUID, "1.2.840.%s", l[index]);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:2009:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params->calledPresentationAddress, moveDestination);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:145:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(p2, f);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:147:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(p2, item->path);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:156:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(p->path, f);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:326:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(xferSyntaxBuf, UID_Translate(*argv));
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:353:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params.calledPresentationAddress, "%s:%s", node, port);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:354:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:355:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.calledAPTitle, calledAPTitle);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:356:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingAPTitle, callingAPTitle);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:393:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(ipaddr, (char*)inet_ntoa(addr));
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:433:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(uid, prefix);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:451:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(uid+len, (ip-1)); // -1 to stick the . back in there
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:457:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(uid+len+1, ts);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:465:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    return sprintf(uid, "%s.%d", uid, studyNum);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:471:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    return sprintf(uid, "%s.%d.%d", uid, studyNum, seriesNum);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:477:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    return sprintf(uid, "%s.%d.%d.%d", uid, studyNum, seriesNum, instanceNum);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:486:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(uid, sopInstanceUID);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:498:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(uid, studyUID);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:510:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(uid, seriesUID);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:522:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(uid, patientName);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:534:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(uid, accessionNum);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:546:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(uid, patientId);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:558:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(uid, patientBirthdate);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:762:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(lastSOPClass, SOPClass);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:868:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, SOPClass);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:869:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.instanceUID, instanceUID);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:870:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.moveAETitle, moveAETitle);
data/ctn-3.2.0~dfsg/apps/storage_classes/storage_classes.c:172:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params.calledPresentationAddress, "%s:%s", node, port);
data/ctn-3.2.0~dfsg/apps/storage_classes/storage_classes.c:173:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/storage_classes/storage_classes.c:174:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.calledAPTitle, calledAPTitle);
data/ctn-3.2.0~dfsg/apps/storage_classes/storage_classes.c:175:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingAPTitle, callingAPTitle);
data/ctn-3.2.0~dfsg/apps/storage_commit/association.c:130:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(criteria.Title, destination);
data/ctn-3.2.0~dfsg/apps/storage_commit/association.c:138:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params->calledPresentationAddress, "%s:%-d", ae.Node, ae.Port);
data/ctn-3.2.0~dfsg/apps/storage_commit/association.c:223:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(service->calledImplementationClassUID,
data/ctn-3.2.0~dfsg/apps/storage_commit/association.c:225:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(service->calledImplementationVersionName,
data/ctn-3.2.0~dfsg/apps/storage_commit/association.c:236:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(processElement->callingAPTitle, service->callingAPTitle);
data/ctn-3.2.0~dfsg/apps/storage_commit/association.c:237:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(processElement->calledAPTitle, service->calledAPTitle);
data/ctn-3.2.0~dfsg/apps/storage_commit/association.c:240:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(processElement->organization, ae.Organization);
data/ctn-3.2.0~dfsg/apps/storage_commit/commit_agent.c:171:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(node, *argv);
data/ctn-3.2.0~dfsg/apps/storage_commit/commit_agent.c:209:6:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    fprintf(stderr, uidError, port);
data/ctn-3.2.0~dfsg/apps/storage_commit/commit_agent.c:413:12:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    (void) vfprintf(fp, controlString, args);
data/ctn-3.2.0~dfsg/apps/storage_commit/commit_request.c:117:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(refSopSeq->referencedSOPClassUID, sopRefRecord->SOPClaUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/commit_request.c:118:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(refSopSeq->referencedSOPInstanceUID, sopRefRecord->SOPInsUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/commit_request.c:207:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(filmBox->refPrintJobClassUID,
data/ctn-3.2.0~dfsg/apps/storage_commit/commit_request.c:209:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(filmBox->refPrintJobInstanceUID,
data/ctn-3.2.0~dfsg/apps/storage_commit/commit_request.c:240:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.classUID, DICOM_SOPCLASSSTORAGECOMMITMENTPUSHMODEL);
data/ctn-3.2.0~dfsg/apps/storage_commit/commit_request.c:241:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(request.instanceUID, DICOM_WELLKNOWNSTORAGECOMMITMENTPUSHMODEL);
data/ctn-3.2.0~dfsg/apps/storage_commit/nevent.c:102:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(workQueue.TasNam, FIS_WQ_STORAGECOMMIT);
data/ctn-3.2.0~dfsg/apps/storage_commit/nevent.c:103:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(workQueue.TasID, transactionUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/nevent.c:126:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/nevent.c:127:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->affectedInstanceUID, request->affectedInstanceUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/nevent.c:181:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(sopReference.TraUID, storageCommit.TraUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/nevent.c:182:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(sopReference.SOPClaUID, ref->referencedSOPClassUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/nevent.c:183:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(sopReference.SOPInsUID, ref->referencedSOPInstanceUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/nevent.c:223:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(sopReference.TraUID, storageCommit.TraUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/nevent.c:224:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(sopReference.SOPClaUID, ref->referencedSOPClassUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/nevent.c:225:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(sopReference.SOPInsUID, ref->referencedSOPInstanceUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/nevent.c:279:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/nevent.c:303:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(sq->referencedSOPClassUID, sopRefRecord->SOPClaUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/nevent.c:304:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(sq->referencedSOPInstanceUID, sopRefRecord->SOPInsUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/nevent.c:317:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(failedSOPSeq->referencedSOPClassUID, sopRefRecord->SOPClaUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/nevent.c:318:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(failedSOPSeq->referencedSOPInstanceUID, sopRefRecord->SOPInsUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/requests.c:130:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(response->classUID, request->classUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c:87:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params->callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c:88:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params->calledAPTitle, calledAPTitle);
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c:89:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params->callingAPTitle, callingAPTitle);
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c:318:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(recs.patient.PatID, patientID);
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c:322:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(recs.study.StuInsUID, studyInstanceUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c:326:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(recs.study.AccNum, accessionNumber);
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c:358:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(commitSOP.TraUID, commit->TraUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c:359:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(commitSOP.SOPClaUID, queryItem->query.image.SOPClaUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c:360:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(commitSOP.SOPInsUID, queryItem->query.image.SOPInsUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c:391:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(transactionUID, commit.TraUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c:393:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(commit.ReqAE, callingAETitle);
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c:394:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(commit.ResAE, destinationAETitle);
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c:430:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p->callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/apps/tbltest/ttlayout.c:87:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    scanf("%s", db);
data/ctn-3.2.0~dfsg/apps/tbltest/ttlayout.c:89:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    scanf("%s", tab);
data/ctn-3.2.0~dfsg/apps/wlma_ui/UxMethod.c:231:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(Names[NumNames], name);
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:231:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void) sprintf(p->PatNam, "%-s^%-s^%c", lastName, firstName, middleInitial[0]);
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:261:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(lastName, p->PatNam);
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:536:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(s.PatUID, p.PatUID);
data/ctn-3.2.0~dfsg/apps/wlma_ui/format.c:78:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void) sprintf(buf, "%-16s %-30s", p->PatID, p->PatNam);
data/ctn-3.2.0~dfsg/apps/wlma_ui/format.c:97:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void) sprintf(buf, "%-16s %-16s %.4s-%.2s-%.2s %-16s %-16s",
data/ctn-3.2.0~dfsg/apps/wlma_ui/format.c:116:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void) sprintf(buf, "%-30s %-16s %.4s-%.2s-%.2s %-20s %-16s %-16s",
data/ctn-3.2.0~dfsg/apps/wlma_ui/format.c:136:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void) sprintf(buf, "%-30s %-16s %.4s-%.2s-%.2s %.2s:%.2s %-20s %-16s",
data/ctn-3.2.0~dfsg/apps/wlma_ui/format.c:182:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void) sprintf(buf, "%-16s %-4s %-20s %-12s",
data/ctn-3.2.0~dfsg/apps/wlma_ui/format.c:201:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(dat, p->SCSeries.SerDat);
data/ctn-3.2.0~dfsg/apps/wlma_ui/format.c:203:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(dat, p->SCSeries.SerTim);
data/ctn-3.2.0~dfsg/apps/wlma_ui/format.c:205:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(aeTitle, p->SCSeries.RetAETit);
data/ctn-3.2.0~dfsg/apps/wlma_ui/format.c:210:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    (void) sprintf(buf, "%-16s %-4s %20s %-12s %-10s %-12s %-16s Images: %4d",
data/ctn-3.2.0~dfsg/apps/wlma_ui/support.c:203:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(s[i].PatUID, p[i].PatUID);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:50:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dateString, d);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:54:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(dateString, "%2d-%3s-%4d",
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:128:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(query.LastName, cgi_val(entries, "lastName"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:190:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DMAN_STORAGEACCESS *access;
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:211:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  while(access != NULL) {
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:213:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tmp, "%17s %s", access->Title, access->DbKey);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:217:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    free(access);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:243:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:295:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:296:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(password, cgi_val(entries, "password"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:355:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:356:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(password, cgi_val(entries, "password"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:357:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(patID, cgi_val(entries, "PatID"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:430:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:431:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(studyUID, cgi_val(entries, "StudyUID"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:432:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(password, cgi_val(entries, "password"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:564:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:565:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(studyUID, cgi_val(entries, "StudyUID"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:566:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(seriesUID, cgi_val(entries, "SeriesUID"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:567:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(password, cgi_val(entries, "password"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:855:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:856:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(seriesUID, cgi_val(entries, "SeriesUID"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:857:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(imageUID, cgi_val(entries, "ImageUID"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:858:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(password, cgi_val(entries, "password"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:965:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:966:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(password, cgi_val(entries, "password"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1017:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tmp, "%-30s %8s (%2d series) %-32s",
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1063:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1064:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(studyUID, cgi_val(entries, "StudyUID"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1065:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(password, cgi_val(entries, "password"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1118:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tmp, "%-10s %6d %15s %15s %15s",
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1156:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1157:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(studyUID, cgi_val(entries, "StudyUID"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1198:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1199:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(studyUID, cgi_val(entries, "StudyUID"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1200:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(seriesUID, cgi_val(entries, "SeriesUID"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1201:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(password, cgi_val(entries, "password"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1287:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1288:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(studyUID, cgi_val(entries, "StudyUID"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1289:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(seriesUID, cgi_val(entries, "SeriesUID"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1290:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(password, cgi_val(entries, "password"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1291:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(destinationApplication, cgi_val(entries, "DestinationApplication"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1340:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(query.PatientID, cgi_val(entries, "patientID"));
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/dicomServerInterface.c:105:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(params->calledPresentationAddress, "%s:%d", localHost, 2100);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/dicomServerInterface.c:106:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(params->callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/dicomServerInterface.c:107:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(params->calledAPTitle, srcTitle);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/dicomServerInterface.c:108:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(params->callingAPTitle, srcTitle);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/dicomServerInterface.c:160:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(moveRequest.classUID, DICOM_SOPSTUDYQUERY_MOVE);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/dicomServerInterface.c:161:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(moveRequest.moveDestination, destinationAPTitle);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:101:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p->query.patient.patNam.personName, buffer);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:423:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(query.patient.InternalID, patientID);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:424:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(query.patient.patID.text, patientID);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:428:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(query.patient.PatID, patientID);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:504:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(query.patient.InternalID, internalID);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:507:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(query.patient.PatID, internalID);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:559:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(query.study.StuInsUID, studyUID);	/* Match on Study UID */
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:609:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(query.study.StuInsUID, studyUID);	/* Match on Study UID */
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:612:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(query.series.SerInsUID, seriesUID);	/* Match on Series UID */
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:656:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(query.series.SerInsUID, seriesUID);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:659:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(query.image.SOPInsUID, imageUID);	/* Match on SOP Ins UID */
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:723:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(query.study.StuInsUID, studyUID);	/* Match on Study UID */
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:783:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(query.study.StuInsUID, studyUID);	/* Match on Study UID */
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:814:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(query.study.StuInsUID, studyUID);	/* Match on Study UID */
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:843:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(query.series.SerInsUID, seriesUID);	/* Match on Study UID */
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:949:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(codeSet, p->Comment);
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:72:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(groupText, cgi_val(entries, "group"));
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:73:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(elementText, cgi_val(entries, "element"));
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:113:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(n->e.description, description);
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:131:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(n->e.description, description);
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:210:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:211:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(password, cgi_val(entries, "password"));
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:256:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tmp, "%-30s %8s (%2d series) %-32s",
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:303:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:304:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(studyUID, cgi_val(entries, "StudyUID"));
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:305:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(password, cgi_val(entries, "password"));
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:359:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tmp, "%-10s %6d %15s %15s %15s",
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:399:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:400:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(studyUID, cgi_val(entries, "StudyUID"));
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:443:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:444:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(studyUID, cgi_val(entries, "StudyUID"));
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:445:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(seriesUID, cgi_val(entries, "SeriesUID"));
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:446:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(password, cgi_val(entries, "password"));
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:534:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:535:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(studyUID, cgi_val(entries, "StudyUID"));
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:536:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(seriesUID, cgi_val(entries, "SeriesUID"));
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:537:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(password, cgi_val(entries, "password"));
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:538:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(destinationApplication, cgi_val(entries, "DestinationApplication"));
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:88:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(f->fileName, dp->d_name);
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:107:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(parentPath, path);
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:298:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(currentDirectory, cgi_val(entries, "CurrentDirectory"));
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:299:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(key, cgi_val(entries, "Key"));
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:301:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(currentDirectory, key);
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:335:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:336:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(password, cgi_val(entries, "password"));
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:381:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tmp, "%-30s %8s (%2d series) %-32s",
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:428:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:429:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(studyUID, cgi_val(entries, "StudyUID"));
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:430:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(password, cgi_val(entries, "password"));
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:484:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tmp, "%-10s %6d %15s %15s %15s",
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:524:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:525:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(studyUID, cgi_val(entries, "StudyUID"));
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:568:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:569:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(studyUID, cgi_val(entries, "StudyUID"));
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:570:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(seriesUID, cgi_val(entries, "SeriesUID"));
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:571:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(password, cgi_val(entries, "password"));
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:659:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbKey, cgi_val(entries, "DBKey"));
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:660:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(studyUID, cgi_val(entries, "StudyUID"));
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:661:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(seriesUID, cgi_val(entries, "SeriesUID"));
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:662:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(password, cgi_val(entries, "password"));
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:663:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(destinationApplication, cgi_val(entries, "DestinationApplication"));
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:280:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(uploadfname,"%s\\%s",UPLOADDIR,entry.value);
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:282:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(uploadfname,"%s/%s",UPLOADDIR,entry.value);
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/string-lib.c:20:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tempstr,str);
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:162:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	n = sscanf(p, "%s %s %s %s %s %s %s",
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:206:2:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	sscanf(p, "%s", temp.ctn_node);
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:212:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	    sscanf(p, "%s %s %s %s %s %s %s",
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:338:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	n = sscanf(p, "%s %s %s %s %s %s %s",
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:385:2:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	sscanf(p, "%s %s %s %s %s %s %s",
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:396:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	    sscanf(p, "%s %s %s %s %s %s %s",
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:472:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "CFG no errors in %s", filename);
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:475:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "CFG Can't open %s", filename);
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:478:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "CFG wrong number of field (line %d, file %s)", lineno, filename);
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:481:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "CFG No entries in configuration %s", filename);
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:484:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "CFG No memory for database using file %s", filename);
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:536:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(value, "%s%s", p, s);	/* Insert its value into result */
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:538:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(value, s);	/* Just copy remainder of string */
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:78:26:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define ABORT2(s1, s2) { fprintf(stderr, (s1), (s2)); exit(1); }
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:138:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(buf, names[j].description);
data/ctn-3.2.0~dfsg/facilities/condition/condition.c:152:12:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    (void) vsprintf(buffer, controlString, args);
data/ctn-3.2.0~dfsg/facilities/condition/condition.c:167:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(EDBStack[stackPtr].statusText, buffer);
data/ctn-3.2.0~dfsg/facilities/database/database.c:172:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(temp, dbkey);
data/ctn-3.2.0~dfsg/facilities/database/database.c:173:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    (void) system(temp);
data/ctn-3.2.0~dfsg/facilities/database/database.c:221:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(GS_root.dbkey, dbkey);
data/ctn-3.2.0~dfsg/facilities/database/database.c:363:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(dbkey, temp->dbkey);
data/ctn-3.2.0~dfsg/facilities/database/database.c:422:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(GS_context->dbkey, dbkey);
data/ctn-3.2.0~dfsg/facilities/database/database.c:3591:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(patid, pnode.pat.PatID);
data/ctn-3.2.0~dfsg/facilities/database/database.c:3592:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(studyuid, snode.study.StudyUID);
data/ctn-3.2.0~dfsg/facilities/database/database.c:3596:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(patid, pnode.pat.PatID);
data/ctn-3.2.0~dfsg/facilities/database/database.c:3597:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(studyuid, snode.study.StudyUID);
data/ctn-3.2.0~dfsg/facilities/database/database.c:4661:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ndate, datestring);
data/ctn-3.2.0~dfsg/facilities/database/database.c:4712:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ntime, timestring);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:186:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(pdu->calledAPTitle, params->calledAPTitle);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:192:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(pdu->callingAPTitle, params->callingAPTitle);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:707:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(subItem->data, name);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:1120:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(scuscpItem->SOPClassUID, name);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:969:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(service->respondingAPTitle, assoc.calledAPTitle);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:970:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(service->callingAPTitle, assoc.callingAPTitle);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:971:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(service->applicationContextName,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:997:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(userPresentationCtx->abstractSyntax,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:1026:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		(void) strcpy(userPresentationCtx->acceptedTransferSyntax,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:1045:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(service->calledImplementationClassUID,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:1047:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(service->calledImplementationVersionName,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:1240:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(service->calledAPTitle, assoc.calledAPTitle);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:1241:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(service->callingAPTitle, assoc.callingAPTitle);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:1242:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(service->applicationContextName,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:1260:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(service->callingImplementationClassUID,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:1262:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(service->callingImplementationVersionName,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:3923:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(userContext->abstractSyntax, context->abstractSyntax.data);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:3948:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(transfer->transferSyntax, subItem->data);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:4103:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(service->calledAPTitle, assoc.calledAPTitle);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:4104:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(service->callingAPTitle, assoc.callingAPTitle);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:4105:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(service->applicationContextName,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:4121:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(service->callingImplementationClassUID,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:4123:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(service->callingImplementationVersionName,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulpresent.c:157:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((*ctx)->abstractSyntax, abstractSyntax);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulpresent.c:160:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((*ctx)->acceptedTransferSyntax, transferSyntax);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulpresent.c:167:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(transfer->transferSyntax, transferSyntax);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulpresent.c:206:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((ctx)->abstractSyntax, abstractSyntax);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulpresent.c:215:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(transfer->transferSyntax, *xferSyntaxes);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:1288:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(title, "%s.%s", params->callingAPTitle, params->calledAPTitle);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:2285:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(node, remote->h_name);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:2348:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy((*key)->keyType, KEY_NETWORK);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:2350:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy((*key)->networkType, networkType);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:2492:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(key->keyType, KEY_ASSOCIATION);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:2493:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(key->networkType, (*networkKey)->networkType);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:2497:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(key->remoteNode, remoteNode);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:2604:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(outputAddress, paramAddress);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:2789:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(indent, " ");
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:2794:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    printf(indent, " ");
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:2798:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    printf(indent, " ");
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1033:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(params.callingPresentationAddress, initiator);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1034:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(params.calledPresentationAddress, acceptor);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1218:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(params.calledAPTitle, assoc.calledAPTitle);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1219:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(params.callingAPTitle, assoc.callingAPTitle);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1220:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(params.applicationContextName,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1234:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingImplementationClassUID,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1236:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.callingImplementationVersionName,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1292:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(params.respondingAPTitle, assoc.calledAPTitle);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1293:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(params.callingAPTitle, assoc.callingAPTitle);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1294:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(params.applicationContextName,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1322:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(userPresentationCtx->abstractSyntax,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1350:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    (void) strcpy(userPresentationCtx->acceptedTransferSyntax,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1367:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.calledImplementationClassUID,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1369:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params.calledImplementationVersionName,
data/ctn-3.2.0~dfsg/facilities/fis/build.c:131:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(approver->approvalDates, record->IntAppDat);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:132:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(approver->approvalTimes, record->IntAppTim);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:133:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(approver->physiciansApproving, record->PhyAppInt);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:404:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(s->PatUID, patientSQ->referencedSOPInstanceUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:425:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(results->ResUID, resultsSQ->referencedSOPInstanceUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:449:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(studyComponent->StuComUID, compSQ->refSOPInstanceUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:694:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(s->StuInsUID, studySQ->referencedSOPInstanceUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:709:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(s->ProCodVal, procedureSQ->codeValue);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:710:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(s->ProCodSchDes, procedureSQ->codingSchemeDesignator);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:711:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(s->ProCodMea, procedureSQ->codeMeaning);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:736:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(scSeries->SerInsUID, seriesSQ->seriesInstanceUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:737:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(scSeries->SerDat, seriesSQ->seriesDate);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:738:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(scSeries->SerTim, seriesSQ->seriesTime);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:740:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(scSeries->RetAETit, seriesSQ->retrieveAETitle);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:744:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(scSeries->StoMedFilSetID, seriesSQ->storageMediaFileSetID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:748:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(scSeries->StoMedFilSetUID, seriesSQ->storageMediaFileSetUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:763:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(scImage->SOPInsUID, imageSQ->refSOPInstanceUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:764:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(scImage->SerInsUID, scSeries->SerInsUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:765:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(scImage->SOPClaUID, imageSQ->refSOPClassUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:768:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(scImage->RetAETit, imageSQ->retrieveAETitle);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:772:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(scImage->StoMedFilSetID, imageSQ->storageMediaFileSetID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:776:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(scImage->StoMedFilSetUID, imageSQ->storageMediaFileSetUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:904:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(interp->IntUID, interpSQ->referencedSOPInstanceUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:921:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(s->StuInsUID, studySQ->referencedSOPInstanceUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1045:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(s->ResUID, resultsSQ->referencedSOPInstanceUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1061:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(s->IntAppDat, approver->approvalDates);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1062:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(s->IntAppTim, approver->approvalTimes);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1063:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(s->PhyAppInt, approver->physiciansApproving);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1098:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(refPatient->referencedSOPClassUID,
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1100:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(refPatient->referencedSOPInstanceUID, patientUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1146:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(refVisit->referencedSOPClassUID,
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1148:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(refVisit->referencedSOPInstanceUID, visitUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1186:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(refStudy->referencedSOPClassUID,
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1188:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(refStudy->referencedSOPInstanceUID, studyUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1227:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(refResults->referencedSOPClassUID,
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1229:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(refResults->referencedSOPInstanceUID, resultsUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1268:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(procedure->codeValue, codeValue);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1269:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(procedure->codingSchemeDesignator, codingScheme);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1270:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(procedure->codeMeaning, codeMeaning);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1316:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(refStudy->referencedSOPClassUID,
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1318:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(refStudy->referencedSOPInstanceUID, studyPtr->StuInsUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1364:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(refStudyComponent->refSOPClassUID,
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1366:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(refStudyComponent->refSOPInstanceUID,
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1417:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(refSeries->seriesDate, series->SerDat);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1418:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(refSeries->seriesTime, series->SerTim);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1419:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(refSeries->seriesInstanceUID, series->SerInsUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1421:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(refSeries->retrieveAETitle, series->RetAETit);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1425:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(refSeries->storageMediaFileSetID, series->StoMedFilSetID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1429:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(refSeries->storageMediaFileSetUID, series->StoMedFilSetUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1473:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(refImage->refSOPClassUID, image->SOPClaUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1474:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(refImage->refSOPInstanceUID, image->SOPInsUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1476:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(refImage->retrieveAETitle, image->RetAETit);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1480:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(refImage->storageMediaFileSetID, image->StoMedFilSetID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1484:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(refImage->storageMediaFileSetUID, image->StoMedFilSetUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1521:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(refResults->referencedSOPClassUID,
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1523:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(refResults->referencedSOPInstanceUID, resultsPtr->ResUID);
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1568:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(refInterpretation->referencedSOPClassUID,
data/ctn-3.2.0~dfsg/facilities/fis/build.c:1570:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(refInterpretation->referencedSOPInstanceUID, interpPtr->IntUID);
data/ctn-3.2.0~dfsg/facilities/fis/event.c:249:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(params->calledPresentationAddress, "%s:%-d", ae.Node, ae.Port);
data/ctn-3.2.0~dfsg/facilities/fis/event.c:250:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params->calledAPTitle, ae.Title);
data/ctn-3.2.0~dfsg/facilities/fis/event.c:251:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params->callingAPTitle, local);
data/ctn-3.2.0~dfsg/facilities/fis/event.c:253:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(params->callingPresentationAddress, localHost);
data/ctn-3.2.0~dfsg/facilities/fis/event.c:342:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(request.classUID, DICOM_SOPCLASSDETACHEDPATIENTMGMT);
data/ctn-3.2.0~dfsg/facilities/fis/event.c:343:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(request.affectedInstanceUID, patient->PatUID);
data/ctn-3.2.0~dfsg/facilities/fis/event.c:349:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(request.classUID, DICOM_SOPCLASSDETACHEDSTUDYMGMT);
data/ctn-3.2.0~dfsg/facilities/fis/event.c:350:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(request.affectedInstanceUID, study->StuInsUID);
data/ctn-3.2.0~dfsg/facilities/fis/event.c:354:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(request.classUID, DICOM_SOPCLASSDETACHEDRESULTSMGMT);
data/ctn-3.2.0~dfsg/facilities/fis/event.c:355:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(request.affectedInstanceUID, results->ResUID);
data/ctn-3.2.0~dfsg/facilities/fis/event.c:359:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(request.classUID, DICOM_SOPCLASSDETACHEDINTERPRETMGMT);
data/ctn-3.2.0~dfsg/facilities/fis/event.c:360:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(request.affectedInstanceUID, interp->IntUID);
data/ctn-3.2.0~dfsg/facilities/fis/event.c:407:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(request.classUID, DICOM_SOPCLASSDETACHEDPATIENTMGMT);
data/ctn-3.2.0~dfsg/facilities/fis/event.c:408:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(request.instanceUID, patient->PatUID);
data/ctn-3.2.0~dfsg/facilities/fis/event.c:414:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(request.classUID, DICOM_SOPCLASSDETACHEDSTUDYMGMT);
data/ctn-3.2.0~dfsg/facilities/fis/event.c:415:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(request.instanceUID, study->StuInsUID);
data/ctn-3.2.0~dfsg/facilities/fis/fisget.c:499:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(localString, criteriaString);
data/ctn-3.2.0~dfsg/facilities/fis/fisget.c:1541:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(localUID, uid);
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:948:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, p);
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:952:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(buf, GQ_QUEUEFILESUFFIX);
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:954:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(buf, temp);
data/ctn-3.2.0~dfsg/facilities/hap/hap.c:336:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		(void) strcpy(queryLevelString, levelMap[index].queryLevel);
data/ctn-3.2.0~dfsg/facilities/hap/hap.c:354:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		(void) strcpy(SOPClass, classMap[index].SOPClass);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildinterp.c:339:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(results->referencedSOPClassUID, "%s",
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildinterp.c:341:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(results->referencedSOPInstanceUID, "%s",
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildinterp.c:347:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(approver->physiciansApproving, "%s",
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildinterp.c:349:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(approver->approvalDates, "%s",
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildinterp.c:351:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(approver->approvalTimes, "%s",
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildinterp.c:357:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(diagnosis->codeValue, "%s",
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildinterp.c:359:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(diagnosis->codingSchemeDesignator, "%s",
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildinterp.c:361:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(diagnosis->codeMeaning, "%s",
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildinterp.c:429:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.RRSequence[p.RRSequenceCount],
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildinterp.c:435:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.IApprover[p.IApprovalSequenceCount],
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildinterp.c:438:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.IADates[p.IApprovalSequenceCount],
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildinterp.c:441:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.IATimes[p.IApprovalSequenceCount],
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildinterp.c:447:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.IDCSequence[p.IDCSequenceCount].
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildinterp.c:450:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.IDCSequence[p.IDCSequenceCount].
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildinterp.c:453:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.IDCSequence[p.IDCSequenceCount].
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildpatient.c:306:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(visit->referencedSOPClassUID, "%s", sops[i].sopclass);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildpatient.c:307:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(visit->referencedSOPInstanceUID, "%s", p.RVSequence[index]);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildpatient.c:312:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(study->referencedSOPClassUID, "%s", sops[i].sopclass);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildpatient.c:313:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(study->referencedSOPInstanceUID, "%s", p.RSSequence[index]);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildpatient.c:433:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.RVSequence[p.RVSequenceCount],
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildpatient.c:439:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.RSSequence[p.RSSequenceCount],
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildresults.c:279:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(interp->referencedSOPClassUID, "%s", sops[i].sopclass);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildresults.c:280:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(interp->referencedSOPInstanceUID, "%s",
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildresults.c:286:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(study->referencedSOPClassUID, "%s", sops[i].sopclass);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildresults.c:287:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(study->referencedSOPInstanceUID, "%s",
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildresults.c:409:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.RSSequence[p.RSSequenceCount],
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildresults.c:415:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.RISequence[p.RISequenceCount],
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:406:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(patient->referencedSOPClassUID, "%s", sops[i].sopclass);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:407:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(patient->referencedSOPInstanceUID, "%s",
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:413:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(visit->referencedSOPClassUID, "%s", sops[i].sopclass);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:414:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(visit->referencedSOPInstanceUID, "%s", p.RVSequence[index]);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:419:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(results->referencedSOPClassUID, "%s", sops[i].sopclass);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:420:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(results->referencedSOPInstanceUID, "%s",
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:426:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(code->codeValue, "%s", p.PCSequence[index].CodeValue);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:427:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(code->codingSchemeDesignator, "%s",
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:429:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(code->codeMeaning, "%s", p.PCSequence[index].CodeMeaning);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:434:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(code->codeValue, "%s", p.RPCSequence[index].CodeValue);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:435:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(code->codingSchemeDesignator, "%s",
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:437:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(code->codeMeaning, "%s", p.RPCSequence[index].CodeMeaning);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:442:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(component->refSOPClassUID, "%s",
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:444:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(component->refSOPInstanceUID, "%s",
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:645:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.RPSequence[p.RPSequenceCount],
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:651:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.RVSequence[p.RVSequenceCount],
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:657:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.RRSequence[p.RRSequenceCount],
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:663:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.PCSequence[p.PCSequenceCount].CodeValue,
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:665:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.PCSequence[p.PCSequenceCount].
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:667:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.PCSequence[p.PCSequenceCount].CodeMeaning,
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:673:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.RPCSequence[p.RPCSequenceCount].CodeValue,
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:675:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.RPCSequence[p.RPCSequenceCount].
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:677:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.RPCSequence[p.RPCSequenceCount].CodeMeaning,
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:683:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.RSCRSIUIDSequence[p.RSCSequenceCount],
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildstudy.c:685:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.RSCRSCUIDSequence[p.RSCSequenceCount],
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildvisit.c:347:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(patient->referencedSOPClassUID, "%s", sops[i].sopclass);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildvisit.c:348:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(patient->referencedSOPInstanceUID, "%s",
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildvisit.c:354:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(study->referencedSOPClassUID, "%s", sops[i].sopclass);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildvisit.c:355:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(study->referencedSOPInstanceUID, "%s", p.RSSequence[index]);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildvisit.c:360:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(code->codeValue, p.ADCSequence[index].CodeValue);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildvisit.c:361:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(code->codingSchemeDesignator,
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildvisit.c:363:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(code->codeMeaning, p.ADCSequence[index].CodeMeaning);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildvisit.c:368:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(code->codeValue, p.DDCSequence[index].CodeValue);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildvisit.c:369:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(code->codingSchemeDesignator,
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildvisit.c:371:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(code->codeMeaning, p.DDCSequence[index].CodeMeaning);
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildvisit.c:497:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.RPSequence[p.RPSequenceCount],
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildvisit.c:503:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.RSSequence[p.RSSequenceCount],
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildvisit.c:509:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.ADCSequence[p.ADCSequenceCount].CodeValue,
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildvisit.c:511:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.ADCSequence[p.ADCSequenceCount].
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildvisit.c:513:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.ADCSequence[p.ADCSequenceCount].CodeMeaning,
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildvisit.c:519:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.DDCSequence[p.DDCSequenceCount].CodeValue,
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildvisit.c:521:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.DDCSequence[p.DDCSequenceCount].
data/ctn-3.2.0~dfsg/facilities/hap/hapbuildvisit.c:523:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(p.DDCSequence[p.DDCSequenceCount].CodeMeaning,
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:207:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(GS_root.dbkey, dbkey);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:394:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(dbkey, temp->dbkey);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:452:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(GS_context->dbkey, dbkey);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:531:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(GS_root.patient[GS_root.free_p].uid, pat->PIUID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:690:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(GS_root.visit[GS_root.free_v].uid, visit->PVIUID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:822:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(GS_root.study[GS_root.free_s].uid, study->SIUID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:941:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(GS_root.results[GS_root.free_r].uid, results->RIUID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:1057:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(GS_root.interps[GS_root.free_i].uid, interps->IIUID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:1831:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(dest[i].CodeValue, source[i].CodeValue);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:1832:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(dest[i].CodingSchemeDesignator, source[i].CodingSchemeDesignator);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:1833:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(dest[i].CodeMeaning, source[i].CodeMeaning);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:1909:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newpat.ICDate, patient->ICDate);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:1912:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newpat.ICTime, patient->ICTime);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:1915:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newpat.ICUID, patient->ICUID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:1924:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newpat.PName, patient->PName);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:1927:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newpat.PID, patient->PID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:1930:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newpat.IoPID, patient->IoPID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:1933:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newpat.OPIDs, patient->OPIDs);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:1936:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newpat.OPNames, patient->OPNames);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:1939:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newpat.PAddress, patient->PAddress);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:1942:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newpat.PTNumbers, patient->PTNumbers);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:1945:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newpat.PBDate, patient->PBDate);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:1948:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newpat.PSex, patient->PSex);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:1951:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newpat.EGroup, patient->EGroup);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:1954:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newpat.RPreference, patient->RPreference);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:1957:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newpat.CAllergies, patient->CAllergies);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2038:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.ICDate, visit->ICDate);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2041:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.ICTime, visit->ICTime);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2044:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.ICUID, visit->ICUID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2053:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.IIDName, visit->IIDName);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2056:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.IoIID, visit->IoIID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2059:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.AID, visit->AID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2062:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.SADate, visit->SADate);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2065:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.SATime, visit->SATime);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2068:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.ADate, visit->ADate);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2071:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.ATime, visit->ATime);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2074:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.RoAdmissions, visit->RoAdmissions);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2077:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.RPhysician, visit->RPhysician);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2080:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.ADDescription, visit->ADDescription);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2100:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.VSID, visit->VSID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2103:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.CPLocation, visit->CPLocation);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2106:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.SPIResidence, visit->SPIResidence);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2109:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.PIResidence, visit->PIResidence);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2112:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.DDate, visit->DDate);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2115:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.DTime, visit->DTime);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2118:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newvis.DDDescription, visit->DDDescription);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2216:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.ICDate, study->ICDate);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2219:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.ICTime, study->ICTime);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2222:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.ICUID, study->ICUID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2225:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.ANumber, study->ANumber);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2234:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.SID, study->SID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2237:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.SIIssuer, study->SIIssuer);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2240:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.Description, study->Description);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2260:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.StudyStatusID, study->StudyStatusID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2263:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.StudyPriorityID, study->StudyPriorityID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2266:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.SSSDate, study->SSSDate);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2269:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.SSSTime, study->SSSTime);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2272:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.SSLocation, study->SSLocation);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2275:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.SSLATitle, study->SSLATitle);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2278:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.RfStudy, study->RfStudy);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2281:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.RPhysician, study->RPhysician);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2284:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.RPDescription, study->RPDescription);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2304:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.SADate, study->SADate);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2307:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.SATime, study->SATime);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2310:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.SDate, study->SDate);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2313:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.STime, study->STime);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2324:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(newstudy.RSCRSCUIDSequence[i], study->RSCRSCUIDSequence[i]);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2325:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(newstudy.RSCRSIUIDSequence[i], study->RSCRSIUIDSequence[i]);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2330:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.SCDate, study->SCDate);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2333:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.SCTime, study->SCTime);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2336:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.SVDate, study->SVDate);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2339:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.SVTime, study->SVTime);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2342:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.SRDate, study->SRDate);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2345:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newstudy.SRTime, study->SRTime);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2429:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newres.ICDate, results->ICDate);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2432:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newres.ICTime, results->ICTime);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2435:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newres.ICUID, results->ICUID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2444:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newres.RID, results->RID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2447:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newres.RIIssuer, results->RIIssuer);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2450:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newres.Impressions, results->Impressions);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2453:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newres.Comments, results->Comments);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2540:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newinterps.ICDate, interps->ICDate);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2543:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newinterps.ICTime, interps->ICTime);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2546:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newinterps.ICUID, interps->ICUID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2552:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newinterps.IID, interps->IID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2555:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newinterps.IIIssuer, interps->IIIssuer);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2558:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newinterps.ITID, interps->ITID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2561:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newinterps.ISID, interps->ISID);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2564:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newinterps.IRDate, interps->IRDate);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2567:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newinterps.IRTime, interps->IRTime);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2570:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newinterps.IRecorder, interps->IRecorder);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2573:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newinterps.ITranscriber, interps->ITranscriber);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2576:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newinterps.ITDate, interps->ITDate);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2579:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newinterps.ITTime, interps->ITTime);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2582:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newinterps.IAuthor, interps->IAuthor);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2592:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(newinterps.IApprover[i], interps->IApprover[i]);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2593:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(newinterps.IADates[i], interps->IADates[i]);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2594:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(newinterps.IATimes[i], interps->IATimes[i]);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2610:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newinterps.IDiagnosis, interps->IDiagnosis);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2630:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newinterps.IText, interps->IText);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:2633:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(newinterps.RDLSequence, interps->RDLSequence);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:3464:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(patient.RVSequence[j], patient.RVSequence[j + 1]);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:3502:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(visit.RSSequence[j], visit.RSSequence[j + 1]);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:3540:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(patient.RSSequence[j], patient.RSSequence[j + 1]);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:3578:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(study.RRSequence[j], study.RRSequence[j + 1]);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:3617:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(results.RISequence[j], results.RISequence[j + 1]);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:3651:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(results.RISequence[results.RISequenceCount], interpsuid);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:3681:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(study.RRSequence[study.RRSequenceCount], resultsuid);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:3710:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pat.RVSequence[pat.RVSequenceCount], visituid);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:3739:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pat.RSSequence[pat.RSSequenceCount], studyuid);
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:3767:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(visit.RSSequence[visit.RSSequenceCount], studyuid);
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_file.c:144:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(GS_hfh.hunk_file_id, HUNK_ID);
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_man.c:197:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(GS_hfh.hunk_file_id, HUNK_ID);
data/ctn-3.2.0~dfsg/facilities/iap/iap.c:164:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(request.moveAETitle, moveAETitle);
data/ctn-3.2.0~dfsg/facilities/iap/iap.c:236:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(request.moveAETitle, moveAETitle);
data/ctn-3.2.0~dfsg/facilities/iap/iap.c:540:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		(void) strcpy(queryLevelString, levelMap[index].queryLevel);
data/ctn-3.2.0~dfsg/facilities/iap/iap.c:557:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		(void) strcpy(SOPClass, classMap[index].SOPClass);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:783:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tdb, databaseName);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:1021:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(temp_string, uid);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:1601:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(temp_string, field->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:1618:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(temp_string, field->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:1635:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(temp_string, field->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:1902:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(criteria[numsercrits].Value.Value.String, GS_StuNodes[i].StuInsUID);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:1961:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(criteria[numimacrits].Value.Value.String, GS_SerNodes[i].SerInsUID);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2365:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(criteria[numstucrits].Value.Value.String, GS_PatNodes[i].PatID);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2423:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(criteria[numsercrits].Value.Value.String, GS_StuNodes[i].StuInsUID);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2483:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(criteria[numimacrits].Value.Value.String, GS_SerNodes[i].SerInsUID);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2861:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(criteria[numimacrits].Value.Value.String, GS_SerNodes[i].SerInsUID);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3140:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].PatNam, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3145:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].PatID, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3150:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].PatSex, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3155:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].Owner, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3160:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].GroupName, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3165:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].Priv, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3206:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].AccNum, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3211:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].StuID, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3216:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].StuInsUID, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3221:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].RefPhyNam, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3226:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].StuDes, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3231:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].PatAge, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3236:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].PatSiz, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3241:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].PatWei, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3246:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].Owner, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3251:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].GroupName, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3256:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].Priv, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3258:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(GS_StuNodes[i].PatParent, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3329:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].PatNam, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3334:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].PatID, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3339:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].PatSex, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3344:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].Owner, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3349:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].GroupName, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3354:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].Priv, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3427:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].AccNum, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3432:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].StuID, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3437:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].StuInsUID, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3442:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].RefPhyNam, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3447:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].StuDes, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3452:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].PatAge, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3457:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].PatSiz, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3462:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].PatWei, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3467:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].Owner, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3472:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].GroupName, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3477:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].Priv, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3479:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(GS_StuNodes[i].PatParent, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3548:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].Mod, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3553:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].SerNum, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3558:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].SerInsUID, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3563:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].ProNam, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3568:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].SerDes, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3573:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].BodParExa, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3578:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].ViePos, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3583:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].Owner, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3588:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].GroupName, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3593:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].Priv, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3595:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(GS_SerNodes[i].StuParent, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3650:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_ImaNodes[i].ImaNum, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3655:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_ImaNodes[i].SOPInsUID, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3660:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_ImaNodes[i].SOPClaUID, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3670:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_ImaNodes[i].PhoInt, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3675:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_ImaNodes[i].PatOri, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3705:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_ImaNodes[i].Owner, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3710:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_ImaNodes[i].GroupName, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3715:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_ImaNodes[i].Priv, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3717:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(GS_ImaNodes[i].SerParent, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3760:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(ile->RespondingTitle, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3762:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(ile->Medium, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3764:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(ile->Path, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3766:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(ile->Transfer, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:5833:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(temp_string, field->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:1820:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tdb, databaseName);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:2040:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(temp_string, localUID);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:2607:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(temp_string, field->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:2624:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(temp_string, field->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:2641:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(temp_string, field->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:2911:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(criteria[numsercrits].Value.Value.String, GS_StuNodes[i].StuInsUID);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:2969:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(criteria[numimacrits].Value.Value.String, GS_SerNodes[i].SerInsUID);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3382:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(criteria[numstucrits].Value.Value.String,
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3446:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(criteria[numsercrits].Value.Value.String, GS_StuNodes[i].StuInsUID);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3505:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(criteria[numimacrits].Value.Value.String, GS_SerNodes[i].SerInsUID);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3915:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(criteria[numimacrits].Value.Value.String, GS_SerNodes[i].SerInsUID);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4181:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].PatNam, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4186:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].PatID, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4191:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].PatSex, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4196:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].Owner, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4201:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].GroupName, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4206:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].Priv, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4247:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].AccNum, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4252:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].StuID, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4257:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].StuInsUID, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4262:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].RefPhyNam, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4267:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].StuDes, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4272:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].PatAge, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4277:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].PatSiz, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4282:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].PatWei, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4287:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].Owner, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4292:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].GroupName, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4297:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].Priv, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4299:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(GS_StuNodes[i].patParent.text, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4370:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].patNam.personName,
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4378:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].patID.text, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4385:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].PatSex, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4390:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].Owner, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4395:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].GroupName, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4400:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].Priv, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4440:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_PatNodes[i].InternalID, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4478:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].accNum.text, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4485:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].stuID.text, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4492:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].StuInsUID, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4497:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].refPhyNam.personName,
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4505:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].stuDes.text, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4512:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].PatAge, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4517:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].PatSiz, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4522:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].PatWei, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4527:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].Owner, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4532:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].GroupName, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4537:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_StuNodes[i].Priv, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4539:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(GS_StuNodes[i].patParent.text, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4609:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].Mod, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4614:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].SerNum, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4619:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].SerInsUID, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4624:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].proNam.text, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4631:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].serDes.text, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4638:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].BodParExa, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4643:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].ViePos, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4648:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].Owner, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4653:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].GroupName, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4658:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_SerNodes[i].Priv, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4660:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(GS_SerNodes[i].StuParent, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4715:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_ImaNodes[i].ImaNum, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4720:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_ImaNodes[i].SOPInsUID, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4725:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_ImaNodes[i].SOPClaUID, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4735:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_ImaNodes[i].PhoInt, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4740:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_ImaNodes[i].PatOri, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4770:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_ImaNodes[i].Owner, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4775:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_ImaNodes[i].GroupName, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4780:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(GS_ImaNodes[i].Priv, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4782:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(GS_ImaNodes[i].SerParent, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4825:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(ile->RespondingTitle, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4827:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(ile->Medium, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4829:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(ile->Path, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4831:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(ile->Transfer, fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:6519:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(localInsertCopy.patient.InternalID, localInsertCopy.study.StuInsUID);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:6881:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(temp_string, field->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:7003:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(hc->charSet, codeSet);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:7012:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(codeSet, hc->charSet);
data/ctn-3.2.0~dfsg/facilities/info_entity/ie.c:218:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ie_object->classUID, Images[loop].classUID);
data/ctn-3.2.0~dfsg/facilities/info_entity/ie.c:219:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ie_object->objectDescription, Images[loop].obj_description);
data/ctn-3.2.0~dfsg/facilities/info_entity/ie.c:291:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ie_ie->ieDescription, table[loop].ie_description);
data/ctn-3.2.0~dfsg/facilities/info_entity/ie.c:495:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ie_ie->ieDescription, table[loop].ie_description);
data/ctn-3.2.0~dfsg/facilities/info_entity/ie.c:562:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ie_module->moduleDescription,
data/ctn-3.2.0~dfsg/facilities/info_entity/ie.c:766:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ie_module->moduleDescription, modFields_tbl[loop].mod_description);
data/ctn-3.2.0~dfsg/facilities/info_entity/ie.c:930:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ie_object->classUID, Images[loop].classUID);
data/ctn-3.2.0~dfsg/facilities/info_entity/ie.c:931:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ie_object->objectDescription, Images[loop].obj_description);
data/ctn-3.2.0~dfsg/facilities/info_entity/ie.c:946:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(ie_ie->ieDescription, table[loop].ie_description);
data/ctn-3.2.0~dfsg/facilities/info_entity/ie.c:1080:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ie_ie->ieDescription, table[loop].ie_description);
data/ctn-3.2.0~dfsg/facilities/info_entity/ie.c:1096:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(ie_module->moduleDescription,
data/ctn-3.2.0~dfsg/facilities/info_entity/ie.c:1243:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ie_module->moduleDescription, modFields_tbl[loop].mod_description);
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:100:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(w->PatID, field[i].Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:102:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(w->PatNam, field[i].Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:104:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(w->StuUID, field[i].Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:106:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(w->AccNum, field[i].Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:108:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(w->InsAET, field[i].Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:110:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(w->UpdPatID, field[i].Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:112:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(w->UpdPatNam, field[i].Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:114:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(w->UpdAccNum, field[i].Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:116:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(w->Operator, field[i].Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:118:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(w->Comments, field[i].Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:120:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(w->Status, field[i].Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:100:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    translateAccess(const char *accessString, int *access);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:134:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(prv->requestingTitle, requestingTitle);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:135:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(prv->respondingTitle, respondingTitle);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:226:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(aeCriteria.Title, title);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:260:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(aeCriteria.Title, title);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:286:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		       const char *respondingTitle, CTNBOOLEAN * access)
data/ctn-3.2.0~dfsg/facilities/manage/control.c:302:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(matrixCriteria.RequestingTitle, requestingTitle);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:303:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(matrixCriteria.RespondingTitle, respondingTitle);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:333:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(storageCriteria.Title, applicationTitle);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:378:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(databaseCriteria.Title, respondingTitle);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:423:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(groupWork.Title, requestingTitle);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:424:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(groupWork.GroupName, databaseWork.GroupName);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:468:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(criteria.RequestingTitle, requestingTitle);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:469:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(criteria.RespondingTitle, respondingTitle);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:542:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(scratch, (*prv)->storage->Root);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:553:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(scratch1, "/%s", lbl);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:554:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(scratch, scratch1);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:571:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(scratch1, "/%s.%-d.%-d", lbl, i, ++count);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:572:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(scratch, scratch1);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:582:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(rtnFileName, scratch);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:629:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(scratch, (*prv)->storage->Root);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:640:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(scratch1, "/%s/%s", study, series);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:641:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(scratch, scratch1);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:655:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(scratch1, "/%s.%-d.%-d", lbl, i, ++count);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:656:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(scratch, scratch1);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:666:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(rtnFileName, scratch);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:687:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(criteria.Title, applicationTitle);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:750:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(fullName1, h->h_name);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:760:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
translateAccess(const char *accessString, int *access)
data/ctn-3.2.0~dfsg/facilities/manage/control.c:765:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	*access |= ACCESS_READ;
data/ctn-3.2.0~dfsg/facilities/manage/control.c:768:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	*access |= ACCESS_WRITE;
data/ctn-3.2.0~dfsg/facilities/manage/control.c:864:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		       char *respondingTitle, int gqID, CTNBOOLEAN * access)
data/ctn-3.2.0~dfsg/facilities/manage/control.c:880:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(cfgCriteria.RequestingTitle, requestingTitle);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:881:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(cfgCriteria.RespondingTitle, respondingTitle);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:920:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(imageDestination.RequestingTitle, srcApplication);
data/ctn-3.2.0~dfsg/facilities/motif_utl/motifutil.c:160:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(d, txt);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:401:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(obj->keyType, KEY_DCM_OBJECT);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1114:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(s, tmp);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1937:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(localPrefix, prefix);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3561:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(s, vrMap[i].code);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:5196:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy((*object)->fileName, name);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:6407:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy((*object)->fileName, name);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:7317:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(dstObj->keyType, KEY_DCM_OBJECT);
data/ctn-3.2.0~dfsg/facilities/objects/dcm1.c:255:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((*fileMeta)->transferSyntaxUID, DICOM_TRANSFERLITTLEENDIAN);
data/ctn-3.2.0~dfsg/facilities/objects/dcm1.c:256:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((*fileMeta)->implementationClassUID, MIR_IMPLEMENTATIONCLASSUID);
data/ctn-3.2.0~dfsg/facilities/objects/dcm1.c:257:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((*fileMeta)->implementationVersionName, MIR_IMPLEMENTATIONVERSIONNAME);
data/ctn-3.2.0~dfsg/facilities/objects/dcmdict.c:2459:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(element->description, dictionaryPtr->englishDescription);
data/ctn-3.2.0~dfsg/facilities/print/print.c:497:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(refPrint->refSOPClassUID, DICOM_SOPCLASSBASICFILMSESSION);
data/ctn-3.2.0~dfsg/facilities/print/print.c:503:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(refPrint->refSOPInstanceUID,
data/ctn-3.2.0~dfsg/facilities/print/print.c:553:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(refPrint->refSOPClassUID, DICOM_SOPCLASSPRINTJOB);
data/ctn-3.2.0~dfsg/facilities/print/print.c:559:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(refPrint->refSOPInstanceUID,
data/ctn-3.2.0~dfsg/facilities/print/print.c:603:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(refElemPtr[0].d.string,
data/ctn-3.2.0~dfsg/facilities/print/print.c:606:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(refElemPtr[1].d.string,
data/ctn-3.2.0~dfsg/facilities/print/print.c:734:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(PRNbfbAttrib.referencedFilmSessionSOPClassUID,
data/ctn-3.2.0~dfsg/facilities/print/print.c:736:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(PRNbfbAttrib.referencedFilmSessionSOPInstanceUID,
data/ctn-3.2.0~dfsg/facilities/print/print.c:775:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(PRNbfbAttrib.refPrintJobClassUID, refPrint->refSOPClassUID);
data/ctn-3.2.0~dfsg/facilities/print/print.c:776:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(PRNbfbAttrib.refPrintJobInstanceUID,
data/ctn-3.2.0~dfsg/facilities/print/print.c:803:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(((PRN_BASICFILMBOX *) filmStruct)->filmBoxSOPClassUID,
data/ctn-3.2.0~dfsg/facilities/print/print.c:805:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(((PRN_BASICFILMBOX *) filmStruct)->filmBoxSOPInstanceUID,
data/ctn-3.2.0~dfsg/facilities/services/find.c:471:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(classUID, (*findRequest)->classUID);
data/ctn-3.2.0~dfsg/facilities/services/find.c:591:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(findResponse->classUID, classUID);
data/ctn-3.2.0~dfsg/facilities/services/get.c:520:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(classUID, (*getRequest)->classUID);
data/ctn-3.2.0~dfsg/facilities/services/get.c:718:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(getResponse->classUID, classUID);
data/ctn-3.2.0~dfsg/facilities/services/get.c:905:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(storeResponse.classUID, storeRequest->classUID);
data/ctn-3.2.0~dfsg/facilities/services/get.c:906:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(storeResponse.instanceUID, storeRequest->instanceUID);
data/ctn-3.2.0~dfsg/facilities/services/move.c:474:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(classUID, (*moveRequest)->classUID);
data/ctn-3.2.0~dfsg/facilities/services/move.c:588:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(moveResponse->classUID, classUID);
data/ctn-3.2.0~dfsg/facilities/services/services.c:1842:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(qualifiedFile, "%s/%-d.%-d", dirName, pid, fileIndex++);
data/ctn-3.2.0~dfsg/facilities/services/srv1.c:301:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(paramName, prefix);
data/ctn-3.2.0~dfsg/facilities/services/srv1.c:303:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(paramName, SOPClass);
data/ctn-3.2.0~dfsg/facilities/services/srv1.c:326:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(paramName, prefix);
data/ctn-3.2.0~dfsg/facilities/services/srv1.c:328:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(paramName, requestedCtx->abstractSyntax);
data/ctn-3.2.0~dfsg/facilities/services/srv2.c:481:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(scratch, dirName);
data/ctn-3.2.0~dfsg/facilities/services/srv2.c:822:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(qualifiedFile, "%s/%-d.%-d", dirName, pid, fileIndex);
data/ctn-3.2.0~dfsg/facilities/services/storage.c:169:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(fileMeta->mediaStorageSOPClassUID, msg->classUID);
data/ctn-3.2.0~dfsg/facilities/services/storage.c:170:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(fileMeta->mediaStorageSOPInstanceUID, msg->instanceUID);
data/ctn-3.2.0~dfsg/facilities/services/storage.c:171:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(fileMeta->transferSyntaxUID,  xferSyntax);
data/ctn-3.2.0~dfsg/facilities/services/storage.c:172:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(fileMeta->implementationClassUID, MIR_IMPLEMENTATIONCLASSUID);
data/ctn-3.2.0~dfsg/facilities/services/storage.c:173:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(fileMeta->implementationVersionName, MIR_IMPLEMENTATIONVERSIONNAME);
data/ctn-3.2.0~dfsg/facilities/services/storage.c:523:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(storeReply->classUID, (*storeRequest)->classUID);
data/ctn-3.2.0~dfsg/facilities/services/storage.c:524:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(storeReply->instanceUID, (*storeRequest)->instanceUID);
data/ctn-3.2.0~dfsg/facilities/services/verify.c:297:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(echoResponse->classUID, (*echoRequest)->classUID);
data/ctn-3.2.0~dfsg/facilities/tbl/sybase.c:188:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tdb,databaseName);
data/ctn-3.2.0~dfsg/facilities/tbl/sybase.c:189:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ttb,tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/sybase.c:707:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			    sprintf(tabcol,"%s.%s",tableName,up->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/sybase.c:715:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			    sprintf(tabcol,"%s.%s",tableName,up->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/sybase.c:888:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			    sprintf(tabcol,"%s.%s",tableName,fp->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/sybase.c:896:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			    sprintf(tabcol,"%s.%s",tableName,fp->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:240:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(server_name, sn);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:284:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tdb, databaseName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:285:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ttb, tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1196:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(foo, " %s ", str);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1212:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(foo, " %s ", fp->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1260:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(foos, "'%s'", up->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1311:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(foos, "'%s'", fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1383:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(foos, "'%s'", cp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1420:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(*cmdbuffer, str);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1430:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(*cmdbuffer, str);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:245:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(server_name, sn);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:296:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tdb, databaseName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:297:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ttb, tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1238:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(foo, " %s ", str);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1254:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(foo, " %s ", fp->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1302:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(foos, "'%s'", up->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1353:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(foos, "'%s'", fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1425:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(foos, "'%s'", cp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1462:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(*cmdbuffer, str);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1472:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(*cmdbuffer, str);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:101:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command, fp->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:105:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, fp->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:126:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, temp);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:130:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, temp);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:134:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, temp);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:138:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, temp);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:142:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, temp);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:146:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, temp);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:202:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, cp->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:227:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, cp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:239:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(command, foo);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:243:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(command, foo);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:247:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(command, foo);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:251:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(command, foo);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:255:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(command, foo);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:259:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(command, foo);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:323:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, "\'%s\'", up->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:340:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(c, " %s + 1 ", up->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:342:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(c, " %s - 1 ", up->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:346:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s + %d ", up->FieldName, *(up->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:349:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s + %d ", up->FieldName, *(up->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:352:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s + %d ", up->FieldName, *(up->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:355:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s + %d ", up->FieldName, *(up->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:358:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s + %.6f ", up->FieldName, *(up->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:361:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s + %.6f ", up->FieldName, *(up->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:367:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s - %d ", up->FieldName, *(up->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:370:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s - %d ", up->FieldName, *(up->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:373:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s - %d ", up->FieldName, *(up->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:376:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s - %d ", up->FieldName, *(up->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:379:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s - %.6f ", up->FieldName, *(up->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:382:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s - %.6f ", up->FieldName, *(up->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:398:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, up->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:666:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(tdb, databaseName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:667:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ttb, tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:754:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(tdb, databaseName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:755:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ttb, tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:927:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(selectCommand, tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:944:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1019:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(selectCommand, tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1036:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1138:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(updateCommand, tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1150:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1206:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(updateCommand, tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1218:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1304:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1309:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(selectCommand,
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1315:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1316:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, selectCommand);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1330:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(updateCommand,
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1336:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1344:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1398:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(selectCommand,
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1403:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1404:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, selectCommand);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1490:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(insertCommand, tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1499:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1573:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(insertCommand, tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1582:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1673:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(deleteCommand, tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1683:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1733:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(deleteCommand, tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1743:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1833:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(descbuf, lcTable);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1841:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:116:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(temp, "%s %s", punctuation, fieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:117:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(sqlStatement, temp);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:142:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(temp, "%s %d", punctuation, *fp->Value.Value.Unsigned2);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:145:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(temp, "%s %d", punctuation, *fp->Value.Value.Unsigned4);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:148:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(temp, "%s %d", punctuation, *fp->Value.Value.Signed2);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:151:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(temp, "%s %d", punctuation, *fp->Value.Value.Signed4);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:154:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(temp, "%s %f", punctuation, *fp->Value.Value.Float4);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:157:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(temp, "%s %f", punctuation, *fp->Value.Value.Float8);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:160:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(temp, "%s \'", punctuation);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:161:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	  strcat(sqlStatement, temp);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:183:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(temp, "%s ?", punctuation);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:187:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(sqlStatement, temp);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:196:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(temp, " %s ", punctuation);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:197:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(sqlStatement, temp);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:200:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(temp, "%s", cp->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:201:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(sqlStatement, temp);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:233:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sqlStatement, "%s", cp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:259:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(temp, "\'%s\'", cp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:262:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(sqlStatement, temp);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:472:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(temp, "%s %s = ", punctuation, up->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:473:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(sqlStatement, temp);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:496:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(temp, "\'%s\'", up->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:509:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(temp, " %s + 1 ", up->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:511:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(temp, " %s - 1 ", up->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:515:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(temp, " %s + %d ", up->FieldName, *(up->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:518:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(temp, " %s + %d ", up->FieldName, *(up->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:521:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(temp, " %s + %d ", up->FieldName, *(up->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:524:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(temp, " %s + %d ", up->FieldName, *(up->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:527:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(temp, " %s + %.6f ", up->FieldName, *(up->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:530:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(temp, " %s + %.6f ", up->FieldName, *(up->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:536:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(temp, " %s - %d ", up->FieldName, *(up->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:539:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(temp, " %s - %d ", up->FieldName, *(up->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:542:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(temp, " %s - %d ", up->FieldName, *(up->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:545:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(temp, " %s - %d ", up->FieldName, *(up->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:548:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(temp, " %s - %.6f ", up->FieldName, *(up->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:551:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(temp, " %s - %.6f ", up->FieldName, *(up->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:555:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(sqlStatement, temp);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:702:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(accessScratch, accessString);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:713:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(szdsn, nextToken);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:718:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(szuid, nextToken);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:723:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(szpwd, nextToken);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:758:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(msg, "Could not connect to ODBC data server %s", szdsn);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:761:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(msg, "Used the login:password (%s:%s)", szuid, szpwd);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:808:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tdb, databaseName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:809:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ttb, tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:875:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(accessScratch, accessString);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:886:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(szdsn, nextToken);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:891:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(szuid, nextToken);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:896:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(szpwd, nextToken);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:931:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(msg, "Could not connect to ODBC data server %s", szdsn);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:934:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(msg, "Used the login:password (%s:%s)", szuid, szpwd);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:975:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(tdb, databaseName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1181:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(sqlStatement, "USE %s", dbName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1210:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(temp, " FROM %s ", tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1211:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(sqlStatement, temp);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1348:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(sqlStatement, "USE %s", dbName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1377:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(temp, " FROM %s ", tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1378:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(sqlStatement, temp);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1551:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(sqlStatement, "USE %s", dbName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1579:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(sqlStatement, "UPDATE %s SET ", tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1695:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(sqlStatement, "USE %s", dbName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1723:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(sqlStatement, "UPDATE %s SET ", tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1894:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(sqlStatement, "USE %s", dbName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1911:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(sqlStatement,
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1941:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(sqlStatement,
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2056:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(sqlStatement, "USE %s", dbName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2087:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(sqlStatement, "INSERT %s ( ", tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2189:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(sqlStatement, "USE %s", dbName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2223:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(sqlStatement, "INSERT %s ( ", tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2477:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(sqlStatement, "USE %s", dbName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2499:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(sqlStatement, "DELETE FROM %s", tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2589:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(sqlStatement, "USE %s", dbName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2611:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(sqlStatement, "DELETE FROM %s", tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2733:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(sqlStatement, "USE %s", databaseName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2753:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(sqlStatement,
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:243:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(server_name, sn);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:245:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(server_name, sn);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:305:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(localDBName, databaseName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:349:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tdb, databaseName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:350:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ttb, tableName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:898:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			    sprintf(tabcol, "%s.%s", tableName, up->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:906:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			    sprintf(tabcol, "%s.%s", tableName, up->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:1195:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			    sprintf(tabcol, "%s.%s", tableName, fp->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:1203:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			    sprintf(tabcol, "%s.%s", tableName, fp->FieldName);
data/ctn-3.2.0~dfsg/facilities/tbl/ufs.c:249:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(to, from);
data/ctn-3.2.0~dfsg/facilities/tbl/ufs.c:251:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(to, env);
data/ctn-3.2.0~dfsg/facilities/tbl/ufs.c:264:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(handle->fileName, fileName);
data/ctn-3.2.0~dfsg/facilities/tbl/ufs.c:271:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if (sscanf(line, "%s", scratch) == 1) {
data/ctn-3.2.0~dfsg/facilities/tbl/ufs.c:278:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
		if (sscanf(line, "%s %s", scratch, field->fieldName) != 2)
data/ctn-3.2.0~dfsg/facilities/tbl/ufs.c:345:10:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	    if (sscanf(p, "%s %n", scratch, &charsRead) != 1)
data/ctn-3.2.0~dfsg/facilities/tbl/ufs.c:358:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
		if (sscanf(p, "%s %n", scratch, &charsRead) != 1)
data/ctn-3.2.0~dfsg/facilities/tbl/ufs.c:482:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void) strcpy(field->Value.Value.String, value);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:130:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(command, fp->FieldName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:134:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, fp->FieldName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:155:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, temp);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:159:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, temp);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:163:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, temp);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:167:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, temp);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:171:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, temp);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:175:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, temp);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:235:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, cp->FieldName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:261:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, cp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:273:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(command, foo);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:277:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(command, foo);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:281:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(command, foo);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:285:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(command, foo);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:289:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(command, foo);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:293:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(command, foo);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:363:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, "\'%s\'", up->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:380:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(c, " %s + 1 ", up->FieldName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:382:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(c, " %s - 1 ", up->FieldName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:386:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s + %d ", up->FieldName, *(up->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:389:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s + %d ", up->FieldName, *(up->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:392:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s + %d ", up->FieldName, *(up->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:395:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s + %d ", up->FieldName, *(up->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:398:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s + %.6f ", up->FieldName, *(up->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:401:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s + %.6f ", up->FieldName, *(up->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:407:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s - %d ", up->FieldName, *(up->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:410:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s - %d ", up->FieldName, *(up->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:413:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s - %d ", up->FieldName, *(up->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:416:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s - %d ", up->FieldName, *(up->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:419:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s - %.6f ", up->FieldName, *(up->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:422:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(c, " %s - %.6f ", up->FieldName, *(up->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:438:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(command, up->FieldName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:695:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(server_name, sn);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:740:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(tdb, databaseName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:741:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ttb, tableName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:864:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(tdb, databaseName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:865:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ttb, tableName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1067:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(selectCommand, tableName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1084:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1219:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(selectCommand, tableName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1236:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1339:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(updateCommand, tableName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1351:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1520:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(updateCommand, tableName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1532:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1701:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1706:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(selectCommand,
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1712:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1713:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, selectCommand);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1727:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(updateCommand,
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1733:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1741:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1756:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(selectCommand, tableName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1773:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1942:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(insertCommand, tableName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1951:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2072:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(insertCommand, tableName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2081:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2218:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(deleteCommand, tableName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2228:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2360:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(deleteCommand, tableName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2370:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2515:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(descbuf, lcTable);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2523:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, PQresultErrorMessage(res));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2565:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(foo, " %s ", str);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2581:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(foo, " %s ", fp->FieldName);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2629:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(foos, "'%s'", up->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2680:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(foos, "'%s'", fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2752:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(foos, "'%s'", cp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2789:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(*cmdbuffer, str);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2799:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(*cmdbuffer, str);
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:108:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(uid, "%s.%-ld.%-ld.%-d.%-ld",
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:112:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(uid, "%s.%-ld.%-ld.%-d.%-ld",
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:116:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(uid, "%s.%-ld.%-ld.%-d.%-ld",
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:120:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(uid, "%s.%-ld.%-ld.%-d.%-ld",
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:124:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(uid, "%s.%-ld.%-ld.%-d.%-ld",
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:128:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(uid, "%s.%-ld.%-ld.%-d.%-ld",
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:132:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(uid, "%s.%-ld.%-ld.%-d.%-ld",
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:137:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(uid, "%s.%-ld.%-ld.%-d.%-ld",
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:141:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(uid, "%s.%-ld.%-ld",
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:145:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(uid, "%s.%-ld.%-ld.%-d.%-ld",
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:150:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(uid, "%s.%-ld.%-ld.%-d.%-ld",
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:450:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(description->UID, UID);
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:538:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if (sscanf(buffer, "%s", keyWord) == 1) {
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:540:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
		if (sscanf(buffer, "%s %s", keyWord, b.root) != 2)
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:546:8:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			if (sscanf(buffer, "%s %ld", keyWord, map[index].value) != 2)
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:663:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void) strcpy(uidFile, tmp);
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:693:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(rtnValue, copyValue);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:472:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ndate, datestring);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:523:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ntime, timestring);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:814:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(directoryText, path);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:820:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(item->path, fileInfo.name);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:825:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(item->path, fileInfo.name);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:841:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(item->path, dp->d_name);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:894:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(item->pName, token1);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:896:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(item->pValue, token2);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:920:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(UTL_configFile, p);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:924:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(UTL_configFile, configFile);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:957:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(nameCopy, paramName);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:1004:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(outputPtr, inputText);
data/ctn-3.2.0~dfsg/facilities/xutl/xutl.c:38:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(s->runtime, "%s/runtime/fontmap", c);
data/ctn-3.2.0~dfsg/facilities/xutl/xutl.c:53:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(m->charset, charSet);
data/ctn-3.2.0~dfsg/facilities/xutl/xutl.c:54:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(m->fontname, fontName);
data/ctn-3.2.0~dfsg/facilities/xutl/xutl.c:75:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      sscanf(str, "%s %s", m.charset, m.fontname);
data/ctn-3.2.0~dfsg/facilities/xutl/xutl.c:101:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(fontName, m->fontname);
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:170:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(s, m[ix].nm);
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:231:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(buf, str);
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:295:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(buf, str);
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:3267:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(mParams->calledPresentationAddress, "%s:%s", s3, s4);
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:3269:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(mParams->calledAPTitle, s2);
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:3270:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(mParams->callingAPTitle, s1);
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:3354:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(request.classUID, DICOM_SOPPATIENTQUERY_FIND);
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:310:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("UIDFILE") == NULL) {
data/ctn-3.2.0~dfsg/apps/dcm_create_object/gram_mod.c:272:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((yys = getenv("YYDEBUG")))
data/ctn-3.2.0~dfsg/apps/icon/create_db_entry.c:98:10:  [3] (buffer) getwd:
  This does not protect against buffer overflows by itself, so use with
  caution (CWE-120, CWE-20). Use getcwd instead.
    if (!getwd(cwd))
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:76:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  user = getenv("REMOTE_USER");
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:993:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    remoteUser = getenv("REMOTE_USER");
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:234:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    remoteUser = getenv("REMOTE_USER");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:359:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    remoteUser = getenv("REMOTE_USER");
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:32:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *httpaccept = getenv("HTTP_ACCEPT");
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:524:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *cookies = getenv("HTTP_COOKIE");
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.h:21:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define SERVER_SOFTWARE getenv("SERVER_SOFTWARE")
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.h:22:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define SERVER_NAME getenv("SERVER_NAME")
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.h:23:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define GATEWAY_INTERFACE getenv("GATEWAY_INTERFACE")
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.h:25:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define SERVER_PROTOCOL getenv("SERVER_PROTOCOL")
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.h:26:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define SERVER_PORT getenv("SERVER_PORT")
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.h:27:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define REQUEST_METHOD getenv("REQUEST_METHOD")
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.h:28:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define PATH_INFO getenv("PATH_INFO")
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.h:29:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define PATH_TRANSLATED getenv("PATH_TRANSLATED")
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.h:30:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define SCRIPT_NAME getenv("SCRIPT_NAME")
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.h:31:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define QUERY_STRING getenv("QUERY_STRING")
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.h:32:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define REMOTE_HOST getenv("REMOTE_HOST")
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.h:33:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define REMOTE_ADDR getenv("REMOTE_ADDR")
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.h:34:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define AUTH_TYPE getenv("AUTH_TYPE")
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.h:35:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define REMOTE_USER getenv("REMOTE_USER")
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.h:36:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define REMOTE_IDENT getenv("REMOTE_IDENT")
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.h:37:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define CONTENT_TYPE getenv("CONTENT_TYPE")
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.h:38:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define CONTENT_LENGTH getenv("CONTENT_LENGTH")
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.h:40:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define HTTP_USER_AGENT getenv("HTTP_USER_AGENT")
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:534:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    p = getenv(var);		/* Look up environment variable */
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:3862:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((TCPBufferLength = getenv("TCP_BUFFER_LENGTH")) != NULL) {
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:2635:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((TCPBufferLength = getenv("TCP_BUFFER_LENGTH")) != NULL) {
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:945:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((p = getenv(GQ_QUEUEDIRECTORY)) == NULL) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:237:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((sn = getenv("CTN_MSQL_SERVER")) == NULL)
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:242:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((sn = getenv("CTN_MYSQL_SERVER")) == NULL)
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:246:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if  ((port = getenv("CTN_MYSQL_SERVER_PORT")) == NULL)
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:691:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		accessString = getenv("SQL_ACCESS");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:864:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    accessString = getenv("SQL_ACCESS");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:239:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((sn = getenv("CTN_SYBASE_SERVER")) == NULL)
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:240:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	    if ((sn = getenv("DSQUERY")) == NULL)
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:303:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("TBL_SYBASE_SPEEDUP") == NULL && G_ConsistencyTestsOnOpen) {
data/ctn-3.2.0~dfsg/facilities/tbl/ufs.c:250:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    while ((env = getenv(to)) != NULL)
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:692:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((sn = getenv("CTN_MSQL_SERVER")) == NULL)
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:658:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	tmp = getenv("UIDFILE");
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:913:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char* p = getenv("CTN_TARGET");
data/ctn-3.2.0~dfsg/facilities/xutl/xutl.c:32:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  c = getenv("CTN_TARGET");
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:269:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("DCM_VERBOSE") == NULL)
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:1303:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("CTN_REDUCED") != NULL) {
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:1309:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("CTN_EXPANDED") != NULL) {
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:1729:2:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	getenv("CTN_EXPANDED") == NULL) {
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:2302:2:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	getenv("CTN_EXPANDED") == NULL) {
data/ctn-3.2.0~dfsg/apps/apps_include/iqueues.h:74:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/apps_include/iqueues.h:97:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/apps_include/print_queue.h:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char instanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/apps_include/print_queue.h:61:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char objFile[256];
data/ctn-3.2.0~dfsg/apps/assoc_tool/load_sopClasses.c:47:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char tSyntaxes[3][DUL_LEN_UID + 1];
data/ctn-3.2.0~dfsg/apps/assoc_tool/load_sopClasses.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sopclass[65];
data/ctn-3.2.0~dfsg/apps/assoc_tool/load_sopClasses.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sopclassW[65];
data/ctn-3.2.0~dfsg/apps/assoc_tool/load_sopClasses.c:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char selectedsopclass[65];
data/ctn-3.2.0~dfsg/apps/assoc_tool/load_sopClasses.c:67:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char selectedsopclassW[65];
data/ctn-3.2.0~dfsg/apps/assoc_tool/load_sopClasses.c:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tSyntaxes[3][DUL_LEN_UID + 1];
data/ctn-3.2.0~dfsg/apps/assoc_tool/load_sopClasses.c:166:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *buffer[65];
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:195:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(info, "PLEASE  SELECT  SERVICE  CLASS  AS  AN ASSOCIATION INITIATOR FROM SCROLLEDLIST 2 \n");
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:251:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(buffer, "  Result : ");
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:252:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buff, "%2x", params.result);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:254:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(buffer, ",  resultSource : ");
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:255:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buff, "%2x", params.resultSource);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:257:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(buffer, ",  diagnostic : ");
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:258:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buff, "%2x", params.diagnostic);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:295:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(info, "      ");
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:297:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(info, "      ");
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:309:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(info, "      (ACCEPTED)\n");
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:313:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(info, "      (REJECTED_USER)\n");
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:330:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(info, "      (REJECTED_NOREASON)\n");
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:347:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(info, "      (REJECTED_ABSTRACT_SYNTAX)\n");
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:363:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(info, "      (REJECTED_TRANSFER_SYNTAX)\n");
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:420:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buff, "%8x", v);
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:423:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(info, "     ");
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:425:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(info, "  ERROR  ");
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:427:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(info, "  WARNING  ");
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:429:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(info, "  FATAL  ");
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:431:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(info, "  INFORMATION  ");
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:475:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(info, " Association has been released \n");
data/ctn-3.2.0~dfsg/apps/assoc_tool/structures.h:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char selectedsopclass[65];
data/ctn-3.2.0~dfsg/apps/assoc_tool/structures.h:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char selectedsopclassW[65];
data/ctn-3.2.0~dfsg/apps/assoc_tool/structures.h:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tSyntaxes[3][DUL_LEN_UID + 1];
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:128:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char tSyntaxes[3][DUL_LEN_UID + 1] = {
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:141:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sopclass[65];
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sopclassW[65];
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:161:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char node[40];		/* the node we are calling */
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:163:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char calledAPTitle[40];	/* called application Title */
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:165:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char callingAPTitle[40];	/* calling application title */
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:167:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char port[40];		/* TCP port to establish Association */
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:169:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char buf_mes[65];
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:245:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[65];
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:514:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(buf_mes, " SELECT AN ITEM FROM SCROLLEDLIST2 BEFORE APPLYING DELETE");
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:622:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(buf_mes, "malloc sopstr1 failed in scrolledList1");
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:627:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(buf_mes, "No SOP class selected from scrolledList1");
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:674:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(buf_mes, " malloc sopstr2 failed in scrolledList2");
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:679:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(buf_mes, "No sopclass selected from scrolledList2");
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:735:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[512] = "";
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:742:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat(buffer, "Association Request Parameters,  Node  not supplied !\n");
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:750:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat(buffer, "Association Request Parameter,  PORT not supplied !\n");
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:758:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat(buffer, "Association Request Parameter,  Calling App Title not supplied !\n");
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:766:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat(buffer, "Association Request Parameter,  called App Title not supplied !\n");
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/FISAccessForm.c:120:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char b[256];
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/applicationForm.c:118:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/applicationForm.c:144:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/applicationForm.c:158:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(b, "%-d", ae->Port);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:19:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:42:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(temp, "%10d", ae->Port);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:48:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(buf, "   ");
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/format.c:133:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/groupNamesForm.c:88:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/groupNamesForm.c:125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char b[256];
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/imageStorageAccessForm.c:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[120];
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/imageStorageControlForm.c:120:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[120];
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/printServerCFGForm.c:120:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/printServerCFGForm.c:146:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/printServerCFGForm.c:156:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    (void) sprintf(buf, "%-6d", p->GQId);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/securityForm.c:121:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/videoImageForm.c:118:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char b[256];
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:135:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char name[128];
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:144:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(name, "LAST%05x^FIRST", v);
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:151:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char string[128];
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:160:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(string, "PID%08d", v);
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:167:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char string[128];
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:177:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(string, "ACC%08d", v);
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:184:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char string[128];
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:199:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char string[128];
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:214:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char string[128];
data/ctn-3.2.0~dfsg/apps/create_greyscale_module/create_greyscale_module.c:86:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/apps/ctn_cutil/ctn_cutil.c:119:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char x1[10240] = "";
data/ctn-3.2.0~dfsg/apps/ctn_cutil/ctn_cutil.c:120:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char x2[10240] = "";
data/ctn-3.2.0~dfsg/apps/ctn_validate_mb/ctn_validate_mb.c:123:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char imageCharSet[1024];
data/ctn-3.2.0~dfsg/apps/ctn_validate_mb/ctn_validate_mb.c:248:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char xlate[1024];
data/ctn-3.2.0~dfsg/apps/ctn_validate_mb/ctn_validate_mb.c:341:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char xlate[1024];
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork.c:88:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char G_nodename[MAX_STRING_LENGTH];
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork.c:89:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char G_dpnname[MAX_STRING_LENGTH];
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork.c:146:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    image_Q_id = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork.c:162:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    G_display_width = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork.c:178:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    G_display_height = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork.c:195:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    G_Number = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:119:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:145:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:181:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(temp, "No Traffic");
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:242:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:307:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:344:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:472:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(temp, "No Traffic");
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:527:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/ctnnetwork/enq_ctnnetwork.c:72:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    qid = atoi(argv[1]);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/enq_ctnnetwork.c:81:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    e.association_id = atoi(argv[4]);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/enq_ctnnetwork.c:82:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    e.connection = atoi(argv[5]);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/enq_ctnnetwork.c:83:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    e.percentage = atoi(argv[6]);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/kill_ctnnetwork.c:72:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    qid = atoi(argv[1]);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/kill_ctnnetwork.c:79:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(e.vendorid, "KILL_DISPLAY");
data/ctn-3.2.0~dfsg/apps/ctnnetwork/pq_ctnnetwork.c:74:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    qid = atoi(argv[1]);
data/ctn-3.2.0~dfsg/apps/database/dbaddimage.c:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/database/dbaddpat.c:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/database/dbaddseries.c:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/database/dbaddstudy.c:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/database/dbdelimage.c:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/database/dbdelpat.c:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/database/dbdelseries.c:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/database/dbdelstudy.c:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/database/dbdump.c:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/database/dblstimages.c:67:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/database/dblstpats.c:67:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/database/dblstseries.c:67:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/database/dblststudies.c:67:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c:127:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(spec.Study.AdmittingDiagnosedDescription, "*D*");
data/ctn-3.2.0~dfsg/apps/dbfill/dbfill.c:96:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char current_dir[MAXPATHLEN];	/* Current directory */
data/ctn-3.2.0~dfsg/apps/dbfill/dbfill.c:159:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char fileName[MAXPATHLEN];
data/ctn-3.2.0~dfsg/apps/dbfill/dbfill.c:259:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(query.Image.FileName, "%.*s", sizeof(query.Image.FileName) - 2, file);
data/ctn-3.2.0~dfsg/apps/dbfill/dbfill.c:388:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/ctn-3.2.0~dfsg/apps/dbfill/dbfill.c:393:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "DBFILL -- ");
data/ctn-3.2.0~dfsg/apps/dcm_add_fragments/dcm_add_fragments.c:174:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(*argv, O_RDONLY);
data/ctn-3.2.0~dfsg/apps/dcm_create_object/create.h:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[4096];	/* allocate largest length in DICOM */
data/ctn-3.2.0~dfsg/apps/dcm_create_object/dcm_create_object.c:130:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      yyin = fopen(inputfile, "r");
data/ctn-3.2.0~dfsg/apps/dcm_create_object/dcm_create_object.c:397:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(pixelfile, O_RDONLY);
data/ctn-3.2.0~dfsg/apps/dcm_create_object/dcm_create_object.c:454:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(encapsulatedDocument, O_RDONLY);
data/ctn-3.2.0~dfsg/apps/dcm_create_object/dcm_create_object.c:515:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(binaryTable, O_RDONLY);
data/ctn-3.2.0~dfsg/apps/dcm_create_object/dcm_create_object.c:725:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(e->d.ot, f, sizeof(U32) * count);
data/ctn-3.2.0~dfsg/apps/dcm_create_object/gram.h:9:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		str[4096];
data/ctn-3.2.0~dfsg/apps/dcm_create_object/gram_mod.c:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		str[4096];
data/ctn-3.2.0~dfsg/apps/dcm_create_object/gram_mod.c:606:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	     sprintf(yyval.str,"%ld",DCM_MAKETAG(group,elem));
data/ctn-3.2.0~dfsg/apps/dcm_diff/dcm_diff.c:74:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp1[1024];
data/ctn-3.2.0~dfsg/apps/dcm_diff/dcm_diff.c:75:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp2[1024];
data/ctn-3.2.0~dfsg/apps/dcm_diff/dcm_diff.c:397:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    vmLimit = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/dcm_dump_compressed/dcm_dump_compressed.c:78:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[1024];
data/ctn-3.2.0~dfsg/apps/dcm_dump_compressed/dcm_dump_compressed.c:102:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(fileName, flags, 0666);
data/ctn-3.2.0~dfsg/apps/dcm_dump_compressed/dcm_dump_compressed.c:132:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[150000];
data/ctn-3.2.0~dfsg/apps/dcm_dump_element/dcm_dump_element.c:169:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(fileName, "w");
data/ctn-3.2.0~dfsg/apps/dcm_dump_element/dcm_dump_element.c:275:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    sequenceIndex = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/dcm_dump_element/dcm_dump_element.c:356:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(*argv, fileOptions, 0666);
data/ctn-3.2.0~dfsg/apps/dcm_dump_file/dcm_dump_file.c:74:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[1024];
data/ctn-3.2.0~dfsg/apps/dcm_dump_file/dcm_dump_file.c:87:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char p2[1024];
data/ctn-3.2.0~dfsg/apps/dcm_dump_file/dcm_dump_file.c:154:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    vmLimit = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/dcm_iterator/dcm_iterator.c:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[1024];
data/ctn-3.2.0~dfsg/apps/dcm_iterator/dcm_iterator.c:88:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char p2[1024];
data/ctn-3.2.0~dfsg/apps/dcm_iterator/dcm_iterator.c:108:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char txt[1024];
data/ctn-3.2.0~dfsg/apps/dcm_iterator/dcm_iterator.c:194:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    vmLimit = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/dcm_make_object/dcm_make_object.c:90:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/dcm_make_object/dcm_make_object.c:375:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(pixelfile, O_RDONLY);
data/ctn-3.2.0~dfsg/apps/dcm_map_to_8/dcm_map_to_8.c:144:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/apps/dcm_map_to_8/dcm_map_to_8.c:321:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(photometricInterpretation, "MONOCHROME2");
data/ctn-3.2.0~dfsg/apps/dcm_map_to_8/dcm_map_to_8.c:449:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/apps/dcm_map_to_8/dcm_map_to_8.c:532:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/apps/dcm_map_to_8/dcm_map_to_8.c:690:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/apps/dcm_mask_image/dcm_mask_image.c:97:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char photometricInterpretation[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/dcm_mask_image/dcm_mask_image.c:422:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  valueInteger = atoi(value);
data/ctn-3.2.0~dfsg/apps/dcm_mb_to_euc/dcm_mb_to_euc.c:121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char imageCharSet[1024];
data/ctn-3.2.0~dfsg/apps/dcm_mb_to_euc/dcm_mb_to_euc.c:213:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char xlate[1024];
data/ctn-3.2.0~dfsg/apps/dcm_modify_elements/dcm_modify_elements.c:95:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/dcm_modify_elements/dcm_modify_elements.c:407:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(pixelfile, O_RDONLY);
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/dcm_modify_object.c:127:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    yyin = fopen(modfile, "r");
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/dcm_modify_object.c:421:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(pixelfile, O_RDONLY | O_BINARY);
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/dcm_modify_object.c:423:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(pixelfile, O_RDONLY);
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram.h:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		str[DICOM_LO_LENGTH+1];
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram_mod.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		str[DICOM_LO_LENGTH+1];
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram_mod.c:225:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(type *) memcpy(to, (char *) from, yynewmax * sizeof(type))
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram_mod.c:928:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	     sprintf(yyval.str,"%ld",DCM_MAKETAG(group,elem));
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram_mod_w32.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		str[DICOM_LO_LENGTH+1];
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram_mod_w32.c:225:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(type *) memcpy(to, (char *) from, yynewmax * sizeof(type))
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/gram_mod_w32.c:928:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	     sprintf(yyval.str,"%ld",DCM_MAKETAG(group,elem));
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/modify.h:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[DICOM_LO_LENGTH + 1];	/* allocate largest length in DICOM */
data/ctn-3.2.0~dfsg/apps/dcm_pixel_bits/dcm_pixel_bits.c:167:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/apps/dcm_replace_element/dcm_replace_element.c:103:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(f, O_RDONLY);
data/ctn-3.2.0~dfsg/apps/dcm_snoop/dcm_snoop.c:179:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	cond = DUL_NetworkSnoop(argv[1], atoi(argv[2]), argv[3],
data/ctn-3.2.0~dfsg/apps/dcm_snoop/dcm_snoop.c:180:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		      argv[4], atoi(argv[5]), atoi(argv[6]), atoi(argv[7]));
data/ctn-3.2.0~dfsg/apps/dcm_snoop/dcm_snoop.c:180:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		      argv[4], atoi(argv[5]), atoi(argv[6]), atoi(argv[7]));
data/ctn-3.2.0~dfsg/apps/dcm_snoop/dcm_snoop.c:180:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		      argv[4], atoi(argv[5]), atoi(argv[6]), atoi(argv[7]));
data/ctn-3.2.0~dfsg/apps/dcm_snoop/dcm_snoop.c:375:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) &pdvLength, buf, 4);
data/ctn-3.2.0~dfsg/apps/dcm_snoop/dcm_snoop.c:438:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(&stream[ptr], &buf[6], pdvLength - 2);
data/ctn-3.2.0~dfsg/apps/dcm_snoop/dcm_snoop.c:497:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(&stream[ptr], &buf[6], pdvLength - 2);
data/ctn-3.2.0~dfsg/apps/dcm_snoop/dcm_snoop.c:557:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    fd = open("for_dcm_snoopITOA", O_CREAT | O_WRONLY | O_TRUNC, 0666);
data/ctn-3.2.0~dfsg/apps/dcm_snoop/dcm_snoop.c:575:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void) memcpy(&stream[ptr], &buf[6], pdvLength - 2);
data/ctn-3.2.0~dfsg/apps/dcm_snoop/dcm_snoop.c:643:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    fd = open("for_dcm_snoopATOI", O_CREAT | O_WRONLY | O_TRUNC, 0666);
data/ctn-3.2.0~dfsg/apps/dcm_snoop/dcm_snoop.c:661:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void) memcpy(&stream[ptr], &buf[6], pdvLength - 2);
data/ctn-3.2.0~dfsg/apps/dcm_strip_odd_groups/dcm_strip_odd_groups.c:126:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/dcm_to_html/dcm_to_html.c:345:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char txt[512] = "";
data/ctn-3.2.0~dfsg/apps/dcm_to_html/dcm_to_html.c:351:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(txt, "No data");
data/ctn-3.2.0~dfsg/apps/dcm_to_html/dcm_to_html.c:353:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(txt, "0 length data");
data/ctn-3.2.0~dfsg/apps/dcm_to_html/dcm_to_html.c:366:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%04x %04x",
data/ctn-3.2.0~dfsg/apps/dcm_to_html/dcm_to_html.c:373:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Unimplemented");
data/ctn-3.2.0~dfsg/apps/dcm_to_html/dcm_to_html.c:379:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Unimplemented");
data/ctn-3.2.0~dfsg/apps/dcm_to_html/dcm_to_html.c:388:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%d", *e->d.sl);
data/ctn-3.2.0~dfsg/apps/dcm_to_html/dcm_to_html.c:391:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Unimplemented");
data/ctn-3.2.0~dfsg/apps/dcm_to_html/dcm_to_html.c:394:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%d", *e->d.ss);
data/ctn-3.2.0~dfsg/apps/dcm_to_html/dcm_to_html.c:401:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%d", *e->d.ul);
data/ctn-3.2.0~dfsg/apps/dcm_to_html/dcm_to_html.c:404:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%d", *e->d.us);
data/ctn-3.2.0~dfsg/apps/dcm_to_html/dcm_to_html.c:407:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Unknown");
data/ctn-3.2.0~dfsg/apps/dcm_to_html/dcm_to_html.c:410:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Retired");
data/ctn-3.2.0~dfsg/apps/dcm_to_html/dcm_to_html.c:413:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Context sensitive");
data/ctn-3.2.0~dfsg/apps/dcm_to_html/dcm_to_html.c:419:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "OB or OW");
data/ctn-3.2.0~dfsg/apps/dcm_to_html/dcm_to_html.c:424:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Delimiter");
data/ctn-3.2.0~dfsg/apps/dcm_to_html/dcm_to_html.c:452:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    vmLimit = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/dcm_to_text/dcm_to_text.c:73:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[1024];
data/ctn-3.2.0~dfsg/apps/dcm_to_text/dcm_to_text.c:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/ctn-3.2.0~dfsg/apps/dcm_to_text/dcm_to_text.c:91:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char txt[1024];
data/ctn-3.2.0~dfsg/apps/dcm_to_text/dcm_to_text.c:127:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[1024];
data/ctn-3.2.0~dfsg/apps/dcm_to_text/dcm_to_text.c:146:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[1024];
data/ctn-3.2.0~dfsg/apps/dcm_to_text/dcm_to_text.c:150:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(line, "\t//");
data/ctn-3.2.0~dfsg/apps/dcm_to_xml/dcm_to_xml.c:73:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[1024];
data/ctn-3.2.0~dfsg/apps/dcm_to_xml/dcm_to_xml.c:90:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char txt[1024];
data/ctn-3.2.0~dfsg/apps/dcm_to_xml/dcm_to_xml.c:107:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[1024];
data/ctn-3.2.0~dfsg/apps/dcm_to_xml/dcm_to_xml.c:139:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[1024];
data/ctn-3.2.0~dfsg/apps/dcm_vr_patterns/dcm_vr_patterns.c:77:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char txt[1024];
data/ctn-3.2.0~dfsg/apps/dcm_vr_patterns/dcm_vr_patterns.c:311:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static unsigned char pixels[33];
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/common_disp.h:88:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/common_disp.h:96:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/dcm_w_disp.c:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileNameString[1024] = "";
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:124:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:314:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(idata->error_message, "Too little pixel data supplied");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:473:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Planar Configuration not specified");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:497:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get RED LUT descriptor");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:509:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Incorrect LUT descriptor supplied");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:522:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't allocate memory for RED LUT descriptor");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:534:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get RED LUT descriptor");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:547:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get BLUE LUT descriptor");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:558:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Incorrect LUT descriptor supplied");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:570:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get BLUE LUT descriptor");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:583:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get GREEN LUT descriptor");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:594:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Incorrect LUT descriptor supplied");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:606:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get GREEN LUT descriptor");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:624:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "LUT's have different number of entries");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:635:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get RED LUT");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:647:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Incorrect RED LUT supplied");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:660:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't allocate memory for RED LUT");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:672:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get RED LUT descriptor");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:686:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get BLUE LUT");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:699:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Incorrect BLUE LUT supplied");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:713:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't allocate memory for BLUE LUT");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:726:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get BLUE LUT descriptor");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:741:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get GREEN LUT");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:755:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Incorrect GREEN LUT supplied");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:770:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't allocate memory for GREEN LUT");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:784:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get GREEN LUT descriptor");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:837:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(idata->error_message, "Can't allocate enough local memory");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:918:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(idata->error_message, "Can't allocate enough local memory");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:1090:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(idata->error_message, "Unimplemented Photo Interpretation");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:1110:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(idata->error_message, "Can't allocate enough local memory");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:1269:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(idata->date, "NODATE");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:1277:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(idata->modality, "NOMODALITY");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:1285:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(idata->patname, "NONAME");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:1384:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(idata->error_message, "Can't allocate memory for pixel resize");
data/ctn-3.2.0~dfsg/apps/dcm_w_disp/image_utils.c:1395:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(idata->error_message, "Can't allocate memory for scaling");
data/ctn-3.2.0~dfsg/apps/dicom_echo/dicom_echo.c:126:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/displays/common_disp.h:95:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/displays/common_disp.h:103:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/displays/ctndisp.c:121:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char G_nodename[MAX_STRING_LENGTH];
data/ctn-3.2.0~dfsg/apps/displays/ctndisp.c:122:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char G_dpnname[MAX_STRING_LENGTH];
data/ctn-3.2.0~dfsg/apps/displays/ctndisp.c:159:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/displays/ctndisp.c:182:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    image_Q_id = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp.c:198:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    G_display_width = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp.c:215:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    G_display_height = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp.c:249:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(G_nodename, "UNKNOWN");
data/ctn-3.2.0~dfsg/apps/displays/ctndisp.c:278:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(G_dpnname, "none");
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:154:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:359:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char patient_string[256];
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:379:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(patient_string, " - ");
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:381:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(patient_string, " - ");
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:383:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(patient_string, " - ");
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:528:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char patient_string[256];
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:572:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(patient_string, " - ");
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:574:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(patient_string, " - ");
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:576:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(patient_string, " - ");
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:614:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp[MAX_STRING_LENGTH];
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:665:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(temp, "Incoming");
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:672:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(temp, "Outgoing");
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:688:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:720:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(temp, "Incoming");
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:727:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(temp, "Outgoing");
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:750:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:774:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(temp, "%d", num);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:797:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:824:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(temp, "%d", num);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:869:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tc_small[MAX_STRING_LENGTH],
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_disp.c:122:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char G_nodename[MAX_STRING_LENGTH];
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_disp.c:164:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dicom_file[MAX_STRING_LENGTH];
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_disp.c:204:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    G_display_width = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_disp.c:217:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    G_display_height = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_disp.c:230:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    overrideWidth = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_disp.c:236:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    overrideCenter = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:269:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char patient_string[256];
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:280:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(patient_string, " | ");
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:282:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(patient_string, " | ");
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:284:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(patient_string, " | ");
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:418:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char patient_string[256];
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:459:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(patient_string, " | ");
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:461:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(patient_string, " | ");
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:463:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(patient_string, " | ");
data/ctn-3.2.0~dfsg/apps/displays/dcm_x_utils.c:520:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tc_small[MAX_STRING_LENGTH],
data/ctn-3.2.0~dfsg/apps/displays/enq_ctndisp.c:70:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    qid = atoi(argv[1]);
data/ctn-3.2.0~dfsg/apps/displays/enq_ctndisp.c:78:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    e.connection = atoi(argv[4]);
data/ctn-3.2.0~dfsg/apps/displays/enq_ctndisp.c:79:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    e.inumber = atoi(argv[5]);
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:127:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char imageCharSet[1024];
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:131:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char databaseCharSet[1024];
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:252:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(path, O_RDONLY);
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:283:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:490:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(idata->error_message, "Too little pixel data supplied");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:668:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Planar Configuration not specified");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:692:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get RED LUT descriptor");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:704:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Incorrect LUT descriptor supplied");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:717:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't allocate memory for RED LUT descriptor");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:729:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get RED LUT descriptor");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:742:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get BLUE LUT descriptor");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:753:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Incorrect LUT descriptor supplied");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:765:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get BLUE LUT descriptor");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:778:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get GREEN LUT descriptor");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:789:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Incorrect LUT descriptor supplied");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:801:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get GREEN LUT descriptor");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:819:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "LUT's have different number of entries");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:830:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get RED LUT");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:842:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Incorrect RED LUT supplied");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:855:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't allocate memory for RED LUT");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:867:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get RED LUT descriptor");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:881:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get BLUE LUT");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:894:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Incorrect BLUE LUT supplied");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:908:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't allocate memory for BLUE LUT");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:921:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get BLUE LUT descriptor");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:936:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get GREEN LUT");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:950:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Incorrect GREEN LUT supplied");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:965:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't allocate memory for GREEN LUT");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:979:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(idata->error_message, "Can't get GREEN LUT descriptor");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:1032:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(idata->error_message, "Can't allocate enough local memory");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:1113:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(idata->error_message, "Can't allocate enough local memory");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:1285:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(idata->error_message, "Unimplemented Photo Interpretation");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:1305:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(idata->error_message, "Can't allocate enough local memory");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:1467:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(idata->date, "NODATE");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:1475:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(idata->modality, "NOMODALITY");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:1483:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(idata->patname, "NONAME");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:1582:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(idata->error_message, "Can't allocate memory for pixel resize");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:1593:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(idata->error_message, "Can't allocate memory for scaling");
data/ctn-3.2.0~dfsg/apps/displays/kill_ctndisp.c:76:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    qid = atoi(argv[1]);
data/ctn-3.2.0~dfsg/apps/displays/pq_ctndisp.c:76:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    qid = atoi(argv[1]);
data/ctn-3.2.0~dfsg/apps/fillRSA/workImpInterp.c:104:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char vendor[256];
data/ctn-3.2.0~dfsg/apps/fillRSA/workImpInterp.c:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char patientName[256];
data/ctn-3.2.0~dfsg/apps/fillRSA/workImpInterp.c:106:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char accessionNumber[256];
data/ctn-3.2.0~dfsg/apps/fillRSA/workImpInterp.c:107:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[256];
data/ctn-3.2.0~dfsg/apps/fillRSA/workImpInterp.c:108:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char studyInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/fillRSA/workImpInterp.c:171:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(interpretation.PhyAppInt, "STAFF");
data/ctn-3.2.0~dfsg/apps/fillRSA/workImpInterp.c:172:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(interpretation.IntStaID, "APPROVED");
data/ctn-3.2.0~dfsg/apps/fis_server/fis_server.c:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/fis_server/fis_server.h:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char callingAPTitle[DUL_LEN_TITLE + 1];
data/ctn-3.2.0~dfsg/apps/fis_server/fis_server.h:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char calledAPTitle[DUL_LEN_TITLE + 1];
data/ctn-3.2.0~dfsg/apps/fis_server/ncreate.c:277:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(study.StuStaID, "VERIFIED");
data/ctn-3.2.0~dfsg/apps/fis_server/wlma_server.c:79:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/fis_server/wlma_server.h:23:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char callingAPTitle[DUL_LEN_TITLE + 1];
data/ctn-3.2.0~dfsg/apps/fis_server/wlma_server.h:24:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char calledAPTitle[DUL_LEN_TITLE + 1];
data/ctn-3.2.0~dfsg/apps/gq/gqinitq.c:65:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (GQ_InitQueue(atoi(argv[1]), atoi(argv[2]), atoi(argv[3])) != GQ_NORMAL) {
data/ctn-3.2.0~dfsg/apps/gq/gqinitq.c:65:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (GQ_InitQueue(atoi(argv[1]), atoi(argv[2]), atoi(argv[3])) != GQ_NORMAL) {
data/ctn-3.2.0~dfsg/apps/gq/gqinitq.c:65:52:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (GQ_InitQueue(atoi(argv[1]), atoi(argv[2]), atoi(argv[3])) != GQ_NORMAL) {
data/ctn-3.2.0~dfsg/apps/gq/gqkillq.c:64:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (GQ_GetQueue(atoi(argv[1]), atoi(argv[2])) != GQ_NORMAL) {
data/ctn-3.2.0~dfsg/apps/gq/gqkillq.c:64:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (GQ_GetQueue(atoi(argv[1]), atoi(argv[2])) != GQ_NORMAL) {
data/ctn-3.2.0~dfsg/apps/gq/gqkillq.c:70:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (GQ_KillQueue(atoi(argv[1])) != GQ_NORMAL) {
data/ctn-3.2.0~dfsg/apps/gq/gqtest.c:6:5:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
int atoi(char *s);
data/ctn-3.2.0~dfsg/apps/gq/gqtest.c:11:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char b[10];
data/ctn-3.2.0~dfsg/apps/gq/gqtest.c:28:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(e.b, "Element 1");
data/ctn-3.2.0~dfsg/apps/gq/gqtest.c:40:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(e.b, "Element 2");
data/ctn-3.2.0~dfsg/apps/gq/gqtest.c:52:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(e.b, "Element 3");
data/ctn-3.2.0~dfsg/apps/gq/gqtest.c:74:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(e.b, "Element 4");
data/ctn-3.2.0~dfsg/apps/icon/create_db_entry.c:55:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char dbfile[MAXFILENAME];/* name of the DB database file */
data/ctn-3.2.0~dfsg/apps/icon/create_db_entry.c:56:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char imgfile[MAXFILENAME];	/* name of the image file */
data/ctn-3.2.0~dfsg/apps/icon/create_db_entry.c:57:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char prefmtImgfile[MAXFILENAME];	/* name of the preformatted image
data/ctn-3.2.0~dfsg/apps/icon/create_db_entry.c:59:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char cwd[MAXPATHLEN];	/* current working directory */
data/ctn-3.2.0~dfsg/apps/icon/create_db_entry.c:332:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    (void) sprintf(query.Image.FileName,
data/ctn-3.2.0~dfsg/apps/icon/create_print_entry.c:96:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char cwd[MAXPATHLEN];	/* current working directory */
data/ctn-3.2.0~dfsg/apps/icon/create_print_entry.c:132:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char dbfile[MAXFILENAME];	/* name of the DB database file */
data/ctn-3.2.0~dfsg/apps/icon/create_print_entry.c:133:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char imgfile[MAXFILENAME];	/* name of the image file */
data/ctn-3.2.0~dfsg/apps/icon/create_print_entry.c:134:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char prefmtImgfile[MAXFILENAME];	/* name of the preformatted
data/ctn-3.2.0~dfsg/apps/icon/create_print_entry.c:379:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    (void) sprintf(query.Image.FileName,
data/ctn-3.2.0~dfsg/apps/icon/icon_append_file.c:230:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char
data/ctn-3.2.0~dfsg/apps/icon/icon_append_file.c:313:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(studyicon.Icon, pixeldata, ICON_SIZE);
data/ctn-3.2.0~dfsg/apps/icon/icon_append_index.c:139:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(file, O_RDONLY)) < 0)
data/ctn-3.2.0~dfsg/apps/icon/icon_append_index.c:140:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(file, O_RDONLY | O_CREAT, 0666);
data/ctn-3.2.0~dfsg/apps/idb_viewer/applicationShell1.c:221:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char b[256];
data/ctn-3.2.0~dfsg/apps/idb_viewer/applicationShell1.c:249:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/ctn-3.2.0~dfsg/apps/idb_viewer/applicationShell1.c:263:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char b[256];
data/ctn-3.2.0~dfsg/apps/idb_viewer/applicationShell1.c:292:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/ctn-3.2.0~dfsg/apps/idb_viewer/applicationShell1.c:305:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char b[256];
data/ctn-3.2.0~dfsg/apps/idb_viewer/applicationShell1.c:335:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/ctn-3.2.0~dfsg/apps/idb_viewer/applicationShell1.c:348:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char b[256];
data/ctn-3.2.0~dfsg/apps/idb_viewer/applicationShell1.c:379:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/ctn-3.2.0~dfsg/apps/idb_viewer/applicationShell1.c:389:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char b[256];
data/ctn-3.2.0~dfsg/apps/idb_viewer/applicationShell1.c:399:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/ctn-3.2.0~dfsg/apps/idb_viewer/format.c:94:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(buf, "... Up 1 level ...");
data/ctn-3.2.0~dfsg/apps/idb_viewer/format.c:124:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/idb_viewer/format.c:129:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(buf, "... Up 1 level ...");
data/ctn-3.2.0~dfsg/apps/idb_viewer/format.c:165:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(buf, "... Up 1 level ...");
data/ctn-3.2.0~dfsg/apps/idb_viewer/format.c:193:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(buf, "... Up 1 level ...");
data/ctn-3.2.0~dfsg/apps/idb_viewer/format.c:221:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(buf, "... Up 1 level ...");
data/ctn-3.2.0~dfsg/apps/image_archive/archive_cleaner.c:146:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dateString[DICOM_DA_LENGTH + 2];
data/ctn-3.2.0~dfsg/apps/image_archive/archive_cleaner.c:147:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char timeString[DICOM_TM_LENGTH + 2];
data/ctn-3.2.0~dfsg/apps/image_archive/archive_cleaner.c:171:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(dateString, "%04d%02d%02d",
data/ctn-3.2.0~dfsg/apps/image_archive/archive_cleaner.c:175:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(timeString, "-%02d%02d",
data/ctn-3.2.0~dfsg/apps/image_archive/archive_cleaner.c:199:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(dateString, "-%04d%02d%02d",
data/ctn-3.2.0~dfsg/apps/image_archive/archive_cleaner.c:253:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dateString[DICOM_DA_LENGTH + 2];
data/ctn-3.2.0~dfsg/apps/image_archive/archive_cleaner.c:254:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char timeString[DICOM_TM_LENGTH + 2];
data/ctn-3.2.0~dfsg/apps/image_archive/archive_cleaner.c:278:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(dateString, "%04d%02d%02d",
data/ctn-3.2.0~dfsg/apps/image_archive/archive_cleaner.c:282:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(timeString, "-%02d%02d",
data/ctn-3.2.0~dfsg/apps/image_archive/archive_cleaner.c:307:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(dateString, "-%04d%02d%02d",
data/ctn-3.2.0~dfsg/apps/image_archive/archive_queue.h:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char title[20];
data/ctn-3.2.0~dfsg/apps/image_archive/archive_server.c:255:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(logFile, "a");
data/ctn-3.2.0~dfsg/apps/image_archive/archive_server.c:437:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char node[512 + 1] = "";
data/ctn-3.2.0~dfsg/apps/image_archive/archive_server.c:439:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char node[MAXHOSTNAMELEN + 1] = "";
data/ctn-3.2.0~dfsg/apps/image_archive/archive_server.c:448:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char currentDate[DICOM_DA_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/image_archive/archive_server.c:449:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char currentTime[DICOM_TM_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/image_archive/cget.c:172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/image_archive/commit_result.c:559:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localHost[128];
data/ctn-3.2.0~dfsg/apps/image_archive/find.c:161:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  q1Num = atoi(q1->query.image.ImaNum);
data/ctn-3.2.0~dfsg/apps/image_archive/find.c:162:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  q2Num = atoi(q2->query.image.ImaNum);
data/ctn-3.2.0~dfsg/apps/image_archive/find.c:284:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(response->errorComment,
data/ctn-3.2.0~dfsg/apps/image_archive/image_archive.h:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char callingAPTitle[DUL_LEN_TITLE + 1];
data/ctn-3.2.0~dfsg/apps/image_archive/image_archive.h:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char calledAPTitle[DUL_LEN_TITLE + 1];
data/ctn-3.2.0~dfsg/apps/image_archive/image_archive.h:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char organization[33];
data/ctn-3.2.0~dfsg/apps/image_archive/move.c:97:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char caller[40];
data/ctn-3.2.0~dfsg/apps/image_archive/move.c:98:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char destination[40];
data/ctn-3.2.0~dfsg/apps/image_archive/move.c:185:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/image_archive/move.c:193:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  q1Num = atoi(q1->query.image.ImaNum);
data/ctn-3.2.0~dfsg/apps/image_archive/move.c:194:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  q2Num = atoi(q2->query.image.ImaNum);
data/ctn-3.2.0~dfsg/apps/image_archive/naction.c:96:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char transactionUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/image_archive/parse.c:403:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char numPatRelStuTxt[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/image_archive/parse.c:404:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char numPatRelSerTxt[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/image_archive/parse.c:405:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char numPatRelImaTxt[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/image_archive/parse.c:407:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char numStuRelSerTxt[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/image_archive/parse.c:408:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char numStuRelImaTxt[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/image_archive/parse.c:536:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/image_archive/parse.c:612:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    (void) sprintf(numPatRelStuTxt, "%-d", Query.patient.NumPatRelStu);
data/ctn-3.2.0~dfsg/apps/image_archive/parse.c:613:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    (void) sprintf(numPatRelSerTxt, "%-d", Query.patient.NumPatRelSer);
data/ctn-3.2.0~dfsg/apps/image_archive/parse.c:614:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    (void) sprintf(numPatRelImaTxt, "%-d", Query.patient.NumPatRelIma);
data/ctn-3.2.0~dfsg/apps/image_archive/parse.c:616:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    (void) sprintf(numStuRelSerTxt, "%-d", Query.study.NumStuRelSer);
data/ctn-3.2.0~dfsg/apps/image_archive/parse.c:617:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    (void) sprintf(numStuRelImaTxt, "%-d", Query.study.NumStuRelIma);
data/ctn-3.2.0~dfsg/apps/image_archive/parseMB.c:397:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char numPatRelStuTxt[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/image_archive/parseMB.c:398:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char numPatRelSerTxt[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/image_archive/parseMB.c:399:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char numPatRelImaTxt[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/image_archive/parseMB.c:401:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char numStuRelSerTxt[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/image_archive/parseMB.c:402:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char numStuRelImaTxt[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/image_archive/parseMB.c:551:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/image_archive/parseMB.c:647:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    (void) sprintf(numPatRelStuTxt, "%-d", Query.patient.NumPatRelStu);
data/ctn-3.2.0~dfsg/apps/image_archive/parseMB.c:648:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    (void) sprintf(numPatRelSerTxt, "%-d", Query.patient.NumPatRelSer);
data/ctn-3.2.0~dfsg/apps/image_archive/parseMB.c:649:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    (void) sprintf(numPatRelImaTxt, "%-d", Query.patient.NumPatRelIma);
data/ctn-3.2.0~dfsg/apps/image_archive/parseMB.c:651:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    (void) sprintf(numStuRelSerTxt, "%-d", Query.study.NumStuRelSer);
data/ctn-3.2.0~dfsg/apps/image_archive/parseMB.c:652:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    (void) sprintf(numStuRelImaTxt, "%-d", Query.study.NumStuRelIma);
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:106:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:125:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f = fopen(queueMapFile, "r");
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:207:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(network.vendorid, "vendor");
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:294:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(entry.vendorid, "vendor");
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:325:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(entry.vendorid, "vendor");
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:375:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(ctnnet.vendorid, "vendor");
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:446:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(entry.vendorid, "vendor");
data/ctn-3.2.0~dfsg/apps/image_archive/queue.c:485:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(network.vendorid, "vendor");
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:95:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char lastImageInAssociation[512] = "";
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:96:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char callingAPTitle[20] = "";
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:473:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:606:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    log = fopen("archive_logfile", "a");
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:742:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char imageCharSet[1024];
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:746:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char databaseCharSet[1024];
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:857:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[256];
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:861:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char displayedImage[512] = "";
data/ctn-3.2.0~dfsg/apps/image_archive/requests_dummy.c:443:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/image_archive/requests_dummy.c:559:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    log = fopen("archive_logfile", "a");
data/ctn-3.2.0~dfsg/apps/image_archive/requests_dummy.c:577:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[256];
data/ctn-3.2.0~dfsg/apps/image_server/cget.c:167:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/image_server/fillImageDB.c:171:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(fileName, O_RDONLY);
data/ctn-3.2.0~dfsg/apps/image_server/find.c:255:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(response->errorComment,
data/ctn-3.2.0~dfsg/apps/image_server/image_server.c:125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/image_server/image_server.c:136:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char currentDate[DICOM_DA_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/image_server/image_server.c:137:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char currentTime[DICOM_TM_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/image_server/image_server.c:412:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(logFile, "a");
data/ctn-3.2.0~dfsg/apps/image_server/image_server.h:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char callingAPTitle[DUL_LEN_TITLE + 1];
data/ctn-3.2.0~dfsg/apps/image_server/image_server.h:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char calledAPTitle[DUL_LEN_TITLE + 1];
data/ctn-3.2.0~dfsg/apps/image_server/image_server.h:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char organization[33];
data/ctn-3.2.0~dfsg/apps/image_server/move.c:174:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/image_server/parse.c:425:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/image_server/requests.c:416:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/image_server/requests.c:526:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:617:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[1024];
data/ctn-3.2.0~dfsg/apps/mb_query/mb_query.c:147:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char txt[1024] = "";
data/ctn-3.2.0~dfsg/apps/mb_query/mb_query.c:151:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char textValue[1024];
data/ctn-3.2.0~dfsg/apps/mb_query/mb_query.c:453:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char localHost[40];
data/ctn-3.2.0~dfsg/apps/mb_xlate_test/mb_xlate_test.c:97:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char imageCharSet[1024] = "";
data/ctn-3.2.0~dfsg/apps/mb_xlate_test/mb_xlate_test.c:191:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char forwardCode[10240];
data/ctn-3.2.0~dfsg/apps/mb_xlate_test/mb_xlate_test.c:192:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char inverseCode[10240];
data/ctn-3.2.0~dfsg/apps/mwlQuery/mwlQuery.c:99:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char txt[1024] = "";
data/ctn-3.2.0~dfsg/apps/mwlQuery/mwlQuery.c:103:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char textValue[1024];
data/ctn-3.2.0~dfsg/apps/mwlQuery/mwlQuery.c:176:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/new_uids/new_uids.c:359:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uid[1024];
data/ctn-3.2.0~dfsg/apps/object_viewer/fileSelectionBoxDialog1.c:143:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(info, "No DICOM filename selected from fileSelectionBoxDialog1, ERROR\n");
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:209:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff[80],
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:349:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff[20];
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:354:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buff, "%8x", v);
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:357:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(info, "        ");
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:473:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[80];
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:581:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[80];
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:672:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf2[64],
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:709:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(buf2, "<None>");
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:738:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf2, "%04x,  %04x,  %d", gg, ee, *(ieAttr->element.d.us));
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:745:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf2, " %04x,  %04x,  %d", gg, ee, *(ieAttr->element.d.sl));
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:752:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf2, " %04x, %04x, %d", gg, ee, *(ieAttr->element.d.us));
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:759:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf2, " %04x, %04x, %d", gg, ee, *(ieAttr->element.d.ul));
data/ctn-3.2.0~dfsg/apps/pmgr_motif/ImageAttribute.c:96:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char
data/ctn-3.2.0~dfsg/apps/pmgr_motif/ImageAttribute.c:109:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char UID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/pmgr_motif/ImageAttribute.c:137:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bufchar[64];
data/ctn-3.2.0~dfsg/apps/pmgr_motif/ImageAttribute.c:143:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(bufchar, "%d", bibAttrib.imagePosition);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/display.h:6:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/pmgr_motif/display.h:9:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/pmgr_motif/driver.c:42:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char imagePositionC[64];
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:112:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char buf[MAXLEN];
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:313:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(fb->emptyImageDensity, "%-d", (int) emptyimagedensity * 100);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:338:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(fb->borderDensity, "%-d", (int) borderdensity * 100);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:379:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char text[80];
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:421:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(buf, " Server changed the attribute:  Film Orientation\n");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:432:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(buf, " Server changed the attribute:  Trim\n");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:443:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(buf, " Server changed the attribute:  Max Density\n");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:445:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf(text, "%7.2f", realMaxDen);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:453:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(buf, " Server changed the attribute:  Min Density\n");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:455:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf(text, "%7.2f", realMinDen);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:463:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(buf, " Server changed the attribute:  Empty Image Density\n");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:478:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(buf, " Server changed the attribute:  Border Density\n");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:493:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(buf, " Server changed the attribute:  Annotation Display Format ID\n");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:501:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(buf, " Server changed the attribute:  Configuration Info\n");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:509:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(buf, " Server changed the attribute:  Image Display Format\n");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:513:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(text, "%d", row);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:517:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(text, "%d", col);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:526:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(buf, " Server changed the attribute:  Film Size ID\n");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:554:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(buf, " Server changed the attribute:  Magnification Type\n");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:112:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char filmSessionSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:114:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char buf[MAXLEN];
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:200:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(f->memoryAllocation, "%-d", memoryallocation);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:249:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(buf, " Server changed the attribute:  Copies\n");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:260:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(buf, " Server changed the attribute:  Priority\n");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:274:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(buf, " Server changed the attribute:  Medium Type\n");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:286:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(buf, " Server changed the attribute:  Destination\n");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:297:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(buf, " Server changed the attribute:  Film Session Label\n");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:304:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(buf, " Server changed the attribute:  Memory Allocation\n");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/get_patientList.c:171:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat(item->combo, ", ");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/get_patientList.c:214:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:148:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char UID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:158:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char UID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:171:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:348:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:443:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(imagePositionC, "%i", bibAttrib.imagePosition);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:771:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[ICON_SIZE];
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:1057:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(imagePositionC, "%i", bibAttrib.imagePosition);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:1095:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errorinfo[80];
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:1118:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(errorinfo, "BFB, NAction, retStat = %d", retStat);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:1129:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(errorinfo, "BFB, NDelete, retStat = %d", retStat);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:1265:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(imagePositionC, "%i", bibAttrib.imagePosition);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:1296:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errorinfo[80];
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:1314:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(errorinfo, "BIB, NSet, retStat = %d", retStat);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/pmgr_motif.c:110:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char applicationTitle[20] = "PRINT_MANAGER";
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:151:12:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    (void) strcpy(params->callingAPTitle, "PRINT_CLIENT");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:152:12:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    (void) strcpy(params->calledAPTitle, "PRINT_SERVER");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:158:12:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    (void) strcpy(params->callingPresentationAddress, "calling presentation addr");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:159:12:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    (void) strcpy(params->calledPresentationAddress, "called presentation addr");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:298:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:357:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	numList[index2] = atoi(string);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:400:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/apps/pmgr_motif/selectPrinterDialog.c:105:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char applicationTitle[20];
data/ctn-3.2.0~dfsg/apps/pmgr_motif/selectPrinterDialog.c:150:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/pmgr_motif/selectPrinterDialog.c:203:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/ctn-3.2.0~dfsg/apps/pmgr_motif/selectPrinterDialog.c:244:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256],
data/ctn-3.2.0~dfsg/apps/pmgr_motif/studyListForm.c:115:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[65];
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:122:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char bfsInstanceUID[DICOM_UI_LENGTH + 1];	/* stores the instance
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:125:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char bfbInstanceUID[DICOM_UI_LENGTH + 1];	/* stores the instance
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:159:12:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    (void) strcpy(params->callingAPTitle, "PRINT_CLIENT");
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:160:12:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    (void) strcpy(params->calledAPTitle, "PRINT_SERVER");
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:166:12:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    (void) strcpy(params->callingPresentationAddress, "calling presentation addr");
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:167:12:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    (void) strcpy(params->calledPresentationAddress, "called presentation addr");
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:446:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:505:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	numList[index2] = atoi(string);
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:547:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:1103:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(bibAttrib.imagePosition, "%d", position);
data/ctn-3.2.0~dfsg/apps/print_clients/display_error.c:314:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_clients/display_error.c:322:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat(displayStr, " : ");
data/ctn-3.2.0~dfsg/apps/print_clients/display_error.c:324:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat(displayStr, " - ");
data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.c:126:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char UID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.c:135:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char UID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.c:346:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.c:687:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.c:755:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char
data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.c:818:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(imagePositionC, "%i", bibAttrib.imagePosition);
data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.c:828:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char
data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.c:1065:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.c:1099:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(temp, "Basic Film Box - Standard %d x %d", row, col);
data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.c:1164:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(imagePositionC, "%i", bibAttrib.imagePosition);
data/ctn-3.2.0~dfsg/apps/print_clients/display_study.c:89:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_clients/display_study.c:92:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_clients/display_study.c:179:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_clients/display_study.c:301:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat(item->combo, ", ");
data/ctn-3.2.0~dfsg/apps/print_clients/print_callback.c:52:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char bfsInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_clients/print_callback.c:53:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char bfbInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:114:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char bfsInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:115:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char bfbInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:119:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:151:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:153:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:194:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    films = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:333:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:335:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_clients/print_client_private.c:50:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char bfsInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_clients/print_client_private.c:51:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char bfbInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:168:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:175:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:178:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char bfsInstanceUID[DICOM_UI_LENGTH + 1];	/* instance UID of the parent
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:181:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char bfbInstanceUID[DICOM_UI_LENGTH + 1];	/* instance UID of the last
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:380:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:494:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    filmboxes = atoi(numBFBC);
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:611:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:636:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if ((col = atoi(bfbstdCOL)) == 0) {
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:645:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if ((row = atoi(bfbstdROW)) == 0) {
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:668:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(bfbAttrib.borderDensity, "%i", (int) tempf);
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:678:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(bfbAttrib.emptyImageDensity, "%i", (int) tempf);
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:953:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char temp[40];
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.h:137:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char numBFBC[10] = "1";
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.h:188:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char bfbstdCOL[2] = "2";
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.h:189:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char bfbstdROW[2] = "2";
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.h:262:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char border_density_other[5];
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.h:279:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char empty_image_density_other[5];
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.h:301:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char displayFormatC[30];
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.h:302:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char borderDensityC[10];
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.h:303:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char emptyImageDensityC[10];
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.h:330:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char minDensityC[10] = "0.1";
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.h:331:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char maxDensityC[10] = "3.5";
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.h:355:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char imagePositionC[64];
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr_private.c:44:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char bfsInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr_private.c:45:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char bfbInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_clients/print_query.c:133:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_clients/print_query.c:135:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:161:12:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    (void) strcpy(params->callingAPTitle, "PRINT_CLIENT");
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:162:12:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    (void) strcpy(params->calledAPTitle, "PRINT_SERVER");
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:168:12:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    (void) strcpy(params->callingPresentationAddress, "calling presentation addr");
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:169:12:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    (void) strcpy(params->calledPresentationAddress, "called presentation addr");
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:308:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:367:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	numList[index2] = atoi(string);
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:410:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/apps/print_server/print_server.c:137:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_server/print_server.h:99:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char callingAPTitle[DUL_LEN_TITLE + 1];
data/ctn-3.2.0~dfsg/apps/print_server/print_server.h:100:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char calledAPTitle[DUL_LEN_TITLE + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:78:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char copies[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char priority[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:86:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mediumType[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:90:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filmDestination[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:94:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filmSessionLabel[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:98:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char memoryAllocation[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:103:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char imageDisplayFormat[DICOM_ST_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:107:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char annotationDisplayFormatID[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:111:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filmOrientation[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:115:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filmSizeID[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char magnificationType[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:123:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char smoothingType[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:127:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char borderDensity[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:131:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char emptyImageDensity[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:143:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char trim[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:147:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char configurationInfo[DICOM_ST_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:151:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedFilmSessionSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:152:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedFilmSessionSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:165:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char polarity[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:169:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char magnificationType[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:173:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char smoothingType[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/private.h:177:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char requestedImageSize[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:95:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:154:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	numList[index2] = atoi(string);
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:279:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:284:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fileName, "PRN_%d.%d", pid, fileExtension);
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:655:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:723:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:936:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(request->imageDisplayFormat, "STANDARD\\2,2");
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1087:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char temp[32];
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1088:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%d", request->minDensity);
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1103:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char temp[32];
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1104:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%d", request->maxDensity);
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1288:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			    char temp[32];
data/ctn-3.2.0~dfsg/apps/print_server/verify.c:1289:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			    sprintf(temp, "%d", request->imagePosition);
data/ctn-3.2.0~dfsg/apps/print_server_display/display_prn.c:75:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_server_display/display_prn.c:88:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_server_display/display_prn.c:107:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_server_display/display_prn.c:509:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/print_server_display/display_prn.c:590:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char
data/ctn-3.2.0~dfsg/apps/print_server_display/display_prn.c:598:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(temp, "Image %d is empty", img->position);
data/ctn-3.2.0~dfsg/apps/print_server_display/print_server_display.c:169:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/apps/print_server_display/print_server_display.c:176:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(num, "%d", --num_client);
data/ctn-3.2.0~dfsg/apps/print_server_display/print_server_display.c:194:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/apps/print_server_display/print_server_display.c:225:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(num, "%d", ++num_client);
data/ctn-3.2.0~dfsg/apps/print_server_display/print_server_display.c:327:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    temp = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/print_server_display/print_server_display.c:344:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    temp = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/print_server_display/print_server_display.c:368:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    queue_id = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/query_client/format.c:28:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(buf, "   ");
data/ctn-3.2.0~dfsg/apps/query_client/query_clientdlg.cpp:241:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[128];
data/ctn-3.2.0~dfsg/apps/query_client/query_clientdlg.cpp:269:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[512];
data/ctn-3.2.0~dfsg/apps/query_client/query_clientdlg.cpp:299:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char moveDestination[128];
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:156:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:410:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:736:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.h:22:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char NodeName[65];
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.h:23:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char PortNumber[65];
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.h:24:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char CalledAPTitle[65];
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.h:25:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char CallingAPTitle[65];
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.h:36:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char PatientID[65];
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.h:37:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char LastName[65];
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.h:38:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BirthDate[65];
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.h:39:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char PatientName[65];
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.h:40:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char NumberRelatedStudies[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.h:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char NumberRelatedSeries[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.h:42:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char NumberRelatedImages[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.h:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char AccessionNumber[65];
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.h:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StudyID[17];
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.h:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StudyDate[65];
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.h:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StudyInstanceUID[65];
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.h:51:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SeriesModalities[10][10];
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.h:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SeriesInstanceUID[65];
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.h:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Modality[17];
data/ctn-3.2.0~dfsg/apps/query_client/topLevelShell1.c:206:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char
data/ctn-3.2.0~dfsg/apps/query_client/topLevelShell1.c:257:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char
data/ctn-3.2.0~dfsg/apps/query_client/topLevelShell1.c:300:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char
data/ctn-3.2.0~dfsg/apps/ris_gateway/association.c:497:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:602:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(interpretationPtr->IntTypID, "REPORT");
data/ctn-3.2.0~dfsg/apps/ris_gateway/procevent.c:606:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(interpretationPtr->IntStaID, "CREATED");
data/ctn-3.2.0~dfsg/apps/ris_gateway/requests.c:113:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/ris_gateway/ris_gateway.c:88:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/ris_gateway/ris_gateway.c:118:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    logLevel = atoi(*argv);
data/ctn-3.2.0~dfsg/apps/ris_gateway/ris_gateway.h:23:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char callingAPTitle[DUL_LEN_TITLE + 1];
data/ctn-3.2.0~dfsg/apps/ris_gateway/ris_gateway.h:24:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char calledAPTitle[DUL_LEN_TITLE + 1];
data/ctn-3.2.0~dfsg/apps/rsa_ui/applicationShell1.c:129:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char b[256];
data/ctn-3.2.0~dfsg/apps/rsa_ui/applicationShell1.c:198:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&localResults, &results, sizeof(results));
data/ctn-3.2.0~dfsg/apps/rsa_ui/applicationShell1.c:214:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&localInterpretation, &interpretation, sizeof(interpretation));
data/ctn-3.2.0~dfsg/apps/rsa_ui/applicationShell1.c:432:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/ctn-3.2.0~dfsg/apps/rsa_ui/rsa_ui.c:107:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char applicationTitle[20] = "RSA_MIR";
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:130:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char p2[1024];
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:190:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char xferSyntaxBuf[1024] = "";
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:340:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uid[DICOM_UI_LENGTH+1];
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:462:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:468:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:482:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileXferSyntax[65] = "";
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:68:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localHost[128];
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:88:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char patientName[DICOM_PN_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:89:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char patientID[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:90:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char accessionNumber[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:91:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char studyInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:92:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char seriesInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:93:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char sopInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localHost[128];
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:128:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char patientName[DICOM_PN_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:129:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char patientID[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:130:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char accessionNumber[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:131:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char studyInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:132:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char seriesInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:133:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char sopInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:253:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char namingConvention[1024];
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1215:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char defaultText[512] = "";
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1219:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localText[512] = "";
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1254:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localText[512] = "";
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1310:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char txt[128];
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1311:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tempName[1024] = "";
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1312:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char xlateTable[256] = "";
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1317:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(namingConvention, "r");
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1377:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char newDirectory[1024];
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1378:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char newName[1024];
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1468:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1611:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1646:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(patient_name, "Name:%x", responseCount);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1647:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(birth_date, "1993120%1d", responseCount);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1730:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1968:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(q->Image.FileName, "mr1.1");
data/ctn-3.2.0~dfsg/apps/snp_to_files/snp_to_files.c:113:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    printf("PPA = %d\n", atoi(argv[2]));
data/ctn-3.2.0~dfsg/apps/snp_to_files/snp_to_files.c:116:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    printf("Acceptor port = %d\n", atoi(argv[5]));
data/ctn-3.2.0~dfsg/apps/snp_to_files/snp_to_files.c:117:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    printf("Buffer size (longs) = %d\n", atoi(argv[6]));
data/ctn-3.2.0~dfsg/apps/snp_to_files/snp_to_files.c:118:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    assoc = atoi(argv[7]);
data/ctn-3.2.0~dfsg/apps/snp_to_files/snp_to_files.c:171:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd_itoa = open(argv[8], O_WRONLY | O_CREAT | O_TRUNC, 0666)) == NULL) {
data/ctn-3.2.0~dfsg/apps/snp_to_files/snp_to_files.c:176:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd_atoi = open(argv[9], O_WRONLY | O_CREAT | O_TRUNC, 0666)) == NULL) {
data/ctn-3.2.0~dfsg/apps/snp_to_files/snp_to_files.c:184:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    cond = SNP_Start(argv[1], atoi(argv[2]), argv[3],
data/ctn-3.2.0~dfsg/apps/snp_to_files/snp_to_files.c:185:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		     argv[4], atoi(argv[5]), 20, 5, atoi(argv[6]));
data/ctn-3.2.0~dfsg/apps/snp_to_files/snp_to_files.c:185:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		     argv[4], atoi(argv[5]), 20, 5, atoi(argv[6]));
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:143:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char p2[1024];
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:202:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char xferSyntaxBuf[1024] = "";
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:373:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ac[80];
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:391:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&addr, phe->h_addr_list[0], sizeof(struct in_addr));
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:429:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ipaddr[32], ts[50], *ip;
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:454:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(ts, "%li", timemark);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:483:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uid[DICOM_UI_LENGTH+1];
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:495:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uid[DICOM_UI_LENGTH+1];
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:507:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uid[DICOM_UI_LENGTH+1];
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:519:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uid[DICOM_PN_LENGTH+1];
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:531:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uid[DICOM_SH_LENGTH+1];
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:543:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uid[DICOM_LO_LENGTH+1];
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:555:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uid[DICOM_DA_LENGTH+1];
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:611:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileXferSyntax[65] = "";
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:679:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:684:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:700:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char date[10], uid[65];
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:713:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(date, "%04d%02d%02d", year, month, day);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:729:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(uid, "%li.%d", timeMark, studyNumber);
data/ctn-3.2.0~dfsg/apps/storage_commit/commit_agent.c:121:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char node[MAXHOSTNAMELEN + 1] = "";
data/ctn-3.2.0~dfsg/apps/storage_commit/commit_agent.c:128:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char currentDate[DICOM_DA_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/storage_commit/commit_agent.c:129:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char currentTime[DICOM_TM_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/storage_commit/commit_agent.c:404:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(logFile, "a");
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c:84:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localHost[256];
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c:112:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char transactionUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c:419:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localHost[128];
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.h:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char callingAPTitle[DUL_LEN_TITLE + 1];
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.h:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char calledAPTitle[DUL_LEN_TITLE + 1];
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.h:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char organization[33];
data/ctn-3.2.0~dfsg/apps/tbltest/tbltest.c:27:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char title[128];
data/ctn-3.2.0~dfsg/apps/tbltest/tbltest.c:28:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char node[128];
data/ctn-3.2.0~dfsg/apps/tbltest/tbltest.c:29:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char port[128];
data/ctn-3.2.0~dfsg/apps/tbltest/ttdelete.c:58:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char fname[50],
data/ctn-3.2.0~dfsg/apps/tbltest/ttinsert.c:58:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char fname[50],
data/ctn-3.2.0~dfsg/apps/tbltest/ttlayout.c:60:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char fname[50],
data/ctn-3.2.0~dfsg/apps/tbltest/ttlayout.c:76:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/tbltest/ttselect.c:58:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char fname[50],
data/ctn-3.2.0~dfsg/apps/tbltest/ttselect.c:68:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char textTest[200];
data/ctn-3.2.0~dfsg/apps/tbltest/ttupdate.c:58:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:116:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char studyStatusID[DICOM_CS_LENGTH + 1] = "CREATED";
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:250:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:290:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:379:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(s, "CREATED");
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:381:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(s, "SCHEDULED");
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:383:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(s, "ARRIVED");
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:385:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(s, "COMPLETED");
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:387:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(s, "VERIFIED");
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:389:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(s, "READ");
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:391:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(s, "CREATED");
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:450:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:753:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(studyStatusID, "CREATED");
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:767:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(studyStatusID, "SCHEDULED");
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:781:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(studyStatusID, "ARRIVED");
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:795:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(studyStatusID, "STARTED");
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:809:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(studyStatusID, "COMPLETED");
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:823:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(studyStatusID, "VERIFIED");
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:837:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(studyStatusID, "READ");
data/ctn-3.2.0~dfsg/apps/wlma_ui/demonstrationForm.c:139:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/wlma_ui/demonstrationForm.c:167:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char b[256];
data/ctn-3.2.0~dfsg/apps/wlma_ui/demonstrationForm.c:199:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char b[256];
data/ctn-3.2.0~dfsg/apps/wlma_ui/demonstrationForm.c:249:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char destinationApplication[20];
data/ctn-3.2.0~dfsg/apps/wlma_ui/demonstrationForm.c:264:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(ps->Study.StuStaID, "SCHEDULED");
data/ctn-3.2.0~dfsg/apps/wlma_ui/demonstrationForm.c:321:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char destinationApplication[20];
data/ctn-3.2.0~dfsg/apps/wlma_ui/demonstrationForm.c:335:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(ps->Study.StuStaID, "READ");
data/ctn-3.2.0~dfsg/apps/wlma_ui/demonstrationForm.c:388:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char b[256];
data/ctn-3.2.0~dfsg/apps/wlma_ui/format.c:193:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/apps/wlma_ui/wlma_ui.c:99:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char applicationTitle[20] = "WLMA_MIR";
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:29:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *monthString[12] = {"Jan", "Feb", "Mar",
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:34:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char dateString[20];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char theDate[40], theTime[40];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:72:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f = fopen("/opt/ctn/agent.log", "a");
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:212:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[1024];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:238:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:284:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:287:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[64];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:288:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char codeSet[80] = "";
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:345:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:349:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[64];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:350:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char patID[250] = "";
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:351:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char codeSet[80] = "";
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:418:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:419:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char studyUID[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:426:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[64];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:427:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char codeSet[80] = "";
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:495:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[1024];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:550:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:551:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char studyUID[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:552:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char seriesUID[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:559:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[64];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:560:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char codeSet[80] = "";
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:722:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char txt[512] = "";
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:729:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(txt, "No data");
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:731:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(txt, "0 length data");
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:744:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%04x %04x",
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:751:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Unimplemented");
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:757:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Unimplemented");
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:766:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%d", *e->d.sl);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:769:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Unimplemented");
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:772:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%d", *e->d.ss);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:779:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%d", *e->d.ul);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:782:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%d", *e->d.us);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:785:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Unknown");
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:788:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Retired");
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:791:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Context sensitive");
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:797:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "OB or OW");
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:802:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Delimiter");
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:843:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:844:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char seriesUID[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:845:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char imageUID[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:850:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[64];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:851:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char codeSet[80] = "";
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:957:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:960:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[64];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:961:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char codeSet[80] = "";
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:975:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(password, "READONLY");
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1016:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[1024];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1052:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1053:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char studyUID[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1060:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[64];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1117:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[1024];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1152:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1153:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char studyUID[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1184:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1185:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char studyUID[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1186:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char seriesUID[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1191:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[64];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1273:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64] = "";
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1274:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char studyUID[65] = "";
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1275:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char seriesUID[65] = "";
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1276:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char destinationApplication[17] = "";
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:1277:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[64] = "";
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/dicomServerInterface.c:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char localHost[1024];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:46:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  series1 = atoi(q1->query.series.SerNum);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:47:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  series2 = atoi(q2->query.series.SerNum);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:64:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  image1 = atoi(q1->query.image.ImaNum);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:65:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  image2 = atoi(q2->query.image.ImaNum);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:84:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[512];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:90:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen("/tmp/pname", "w");
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:103:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen("/tmp/smm1", "w");
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:434:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen("/tmp/patid", "a");
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h:22:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char NodeName[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h:23:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char PortNumber[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h:24:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char CalledAPTitle[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h:25:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char CallingAPTitle[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h:36:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char PatientID[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h:37:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char LastName[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h:38:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BirthDate[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h:39:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char PatientName[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h:40:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char NumberRelatedStudies[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char NumberRelatedSeries[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h:42:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char NumberRelatedImages[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char AccessionNumber[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StudyID[17];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h:51:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StudyDate[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StudyInstanceUID[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StudyDescription[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SeriesModalities[10][10];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SeriesInstanceUID[65];
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/query_interface.h:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Modality[17];
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char groupText[10];
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char elementText[10];
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:83:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(e.description, "Attribute not in dictionary");
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:203:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64];
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:206:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[64];
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:219:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(password, "READONLY");
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:255:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[1024];
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:292:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64];
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:293:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char studyUID[65];
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:300:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[64];
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:358:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[1024];
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:395:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64];
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:396:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char studyUID[65];
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:429:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64];
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:430:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char studyUID[65];
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:431:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char seriesUID[65];
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:436:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[64];
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:520:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64] = "";
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:521:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char studyUID[65] = "";
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:522:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char seriesUID[65] = "";
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:523:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char destinationApplication[17] = "";
data/ctn-3.2.0~dfsg/cgi_apps/dd_lookup/dd_lookup.c:524:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[64] = "";
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileName[1024];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char topDirectory[1024];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:100:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char currentDirectory[1024];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:101:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[1024];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:104:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char parentPath[1024];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:147:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char txt[512] = "";
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:154:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(txt, "No data");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:156:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(txt, "0 length data");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:169:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%04x %04x",
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:176:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Unimplemented");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:182:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Unimplemented");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:191:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%d", *e->d.sl);
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:194:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Unimplemented");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:197:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%d", *e->d.ss);
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:204:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%d", *e->d.ul);
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:207:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%d", *e->d.us);
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:210:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Unknown");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:213:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Retired");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:216:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Context sensitive");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:222:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "OB or OW");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:227:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Delimiter");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:290:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char topDirectory[1024];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:291:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char currentDirectory[1024];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:292:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[1024];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:328:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:331:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[64];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:344:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(password, "READONLY");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:380:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[1024];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:417:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:418:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char studyUID[65];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:425:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[64];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:483:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[1024];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:520:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:521:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char studyUID[65];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:554:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:555:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char studyUID[65];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:556:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char seriesUID[65];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:561:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[64];
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:645:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbKey[64] = "";
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:646:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char studyUID[65] = "";
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:647:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char seriesUID[65] = "";
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:648:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char destinationApplication[17] = "";
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:649:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[64] = "";
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:1167:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char txt[512] = "";
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:1173:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(txt, "No data");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:1175:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(txt, "0 length data");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:1188:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%04x %04x",
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:1195:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Unimplemented");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:1201:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Unimplemented");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:1210:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%d", *e->d.sl);
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:1213:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Unimplemented");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:1216:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%d", *e->d.ss);
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:1223:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%d", *e->d.ul);
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:1226:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(txt, "%d", *e->d.us);
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:1229:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Unknown");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:1232:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Retired");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:1235:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Context sensitive");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:1241:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "OB or OW");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:1246:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(txt, "Delimiter");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:1275:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    vmLimit = atoi(*argv);
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:94:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    content_length = atoi(CONTENT_LENGTH);
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:223:22:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    content_length = atol(CONTENT_LENGTH);
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:284:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ( (uploadfile = fopen(uploadfname,"w")) == NULL) {
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:135:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[180];
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:142:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fid = fopen(filename, "r");
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:311:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[180];
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:318:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fid = fopen(filename, "r");
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:468:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[256];
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:487:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "CFG Unknown error (%ld)", cond);
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:520:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char var[80];		/* Place to store variable */
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:521:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[256];
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:540:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(dst, "%.*s", n, value);	/* Copy back to user's buffer */
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.h:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ctn_node[18];
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.h:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char title[18];
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.h:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file[256];
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.h:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char imagepath[256];
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.h:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char quota[18];
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.h:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char read[18];
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.h:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char write[18];
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.h:93:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ctn_node[18];
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.h:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char login[18];
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.h:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char title[18];
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.h:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char flag[18];
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.h:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char spool[18];
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.h:98:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vendor_node[18];
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.h:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char port[18];
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:118:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:134:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf, "<%d>", charSet);
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:765:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(d, s, skipLength); destLength -= skipLength; l += skipLength;
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:811:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(d, s, skipLength); destLength -= skipLength; l += skipLength;
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:855:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(d, s, skipLength); destLength -= skipLength; l += skipLength;
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:889:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(d, s, skipLength); destLength -= skipLength; l += skipLength;
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:1487:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(hex, " %02x", *c);
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:1491:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(hex, "   ");
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:1519:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hexRepresentation[20] = "";
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:1520:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char textRepresentation[20] = "";
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:1542:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(textRepresentation, "<ESC> ...");
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:1573:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(textRepresentation, "<ESC> ...");
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:1605:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(textRepresentation, "<ESC> ...");
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:1638:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(textRepresentation, "<ESC> ...");
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:1697:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hexRepresentation[20] = "";
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:1698:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char textRepresentation[20] = "";
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:1718:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(textRepresentation, "<ESC> ...");
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:1755:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(textRepresentation, "<ESC> ...");
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:1787:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(textRepresentation, "<ESC> ...");
data/ctn-3.2.0~dfsg/facilities/chr/dicom_chr.c:1819:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(textRepresentation, "<ESC> ...");
data/ctn-3.2.0~dfsg/facilities/condition/condition.c:96:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char statusText[256];
data/ctn-3.2.0~dfsg/facilities/condition/condition.c:145:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/database/database.c:171:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(temp, "rm -f ");
data/ctn-3.2.0~dfsg/facilities/database/database.c:266:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/database/database.c:1169:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) new_snode, (void *) snode,
data/ctn-3.2.0~dfsg/facilities/database/database.c:1392:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) new_sernode, (void *) sernode,
data/ctn-3.2.0~dfsg/facilities/database/database.c:3548:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/database/database.c:4533:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/database/database.c:4545:14:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return ((atol(year) * 10000) + (atol(month) * 100) + atol(day));
data/ctn-3.2.0~dfsg/facilities/database/database.c:4545:37:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return ((atol(year) * 10000) + (atol(month) * 100) + atol(day));
data/ctn-3.2.0~dfsg/facilities/database/database.c:4545:58:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return ((atol(year) * 10000) + (atol(month) * 100) + atol(day));
data/ctn-3.2.0~dfsg/facilities/database/database.c:4558:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/database/dbprivate.h:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char
data/ctn-3.2.0~dfsg/facilities/database/dbprivate.h:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dbkey[DB_MAXKEYLENGTH];
data/ctn-3.2.0~dfsg/facilities/database/dbquery.h:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char
data/ctn-3.2.0~dfsg/facilities/database/dbquery.h:104:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char
data/ctn-3.2.0~dfsg/facilities/database/dbquery.h:118:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char
data/ctn-3.2.0~dfsg/facilities/database/dbquery.h:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char
data/ctn-3.2.0~dfsg/facilities/database/dbquery.h:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char FileName[1024];	/* For image access	 */
data/ctn-3.2.0~dfsg/facilities/ddr/ddr.c:117:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(patientPtr, &patientRecord, sizeof(patientRecord));
data/ctn-3.2.0~dfsg/facilities/ddr/ddr.c:160:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(studyPtr, &record, sizeof(record));
data/ctn-3.2.0~dfsg/facilities/ddr/ddr.c:196:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(seriesPtr, &record, sizeof(record));
data/ctn-3.2.0~dfsg/facilities/ddr/ddr.c:255:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(leafPtr, &record, sizeof(record));
data/ctn-3.2.0~dfsg/facilities/ddr/ddr.c:388:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char errTxt[128];
data/ctn-3.2.0~dfsg/facilities/ddr/ddr.c:389:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(errTxt, "DDR_GetPatientList could not find patient with offset: %d", offset);
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char FileSetID[DICOM_CS_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char DescriptorFileID[DICOM_CS_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char SpecificCharacterSet[DICOM_CS_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char PatientName[DICOM_PN_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char PatientID[DICOM_LO_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char BirthDate[DICOM_DA_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char Sex[DICOM_CS_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:76:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char StudyDate[DICOM_DA_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:77:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char StudyTime[DICOM_TM_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:78:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char StudyDescription[DICOM_LO_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:79:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char StudyInstanceUID[DICOM_UI_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:80:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char StudyID[DICOM_SH_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:81:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char AccessionNumber[DICOM_SH_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:88:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char Modality[DICOM_CS_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char SeriesInstanceUID[DICOM_UI_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:90:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char SeriesNumber[DICOM_IS_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:94:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ImageNumber[DICOM_IS_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:100:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char RecordType[DICOM_CS_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:101:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char FileID[DICOM_CS_LENGTH*8 + 1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:102:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char SOPClassUID[DICOM_UI_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:103:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char SOPInstanceUID[DICOM_UI_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/ddr/dicom_ddr.h:104:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char TransferSyntaxUID[DICOM_UI_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/dicom/dicom.h:207:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char string[256];
data/ctn-3.2.0~dfsg/facilities/dicom/dicom.h:209:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(string, "Error number: %d", e);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:1156:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(b, item->data, length);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:1418:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(b, scuscpRole->SOPClassUID, length);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:671:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    (void) sprintf(stateEntries[index].actionName, "%.*s",
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:679:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		(void) sprintf(stateEntries[index].eventName, "%.*s",
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:933:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:1098:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:1205:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:1221:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((*association)->fragmentBuffer, buffer, pduLength);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:2178:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:2335:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:2355:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hBuffer[512];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:2385:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(&server.sin_addr, hp->h_addr, (unsigned long) hp->h_length);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:2444:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:2480:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    fd = open("associate_rq", O_WRONLY | O_CREAT, 0666);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:2541:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:2584:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    fd = open("associate_rp", O_WRONLY | O_CREAT, 0666);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:2648:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:2726:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:2805:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:2885:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buffer[64],
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:3032:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:3286:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(buffer, (*association)->pduHead,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:3741:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    fd = open("outgoing.pdu", O_CREAT | O_WRONLY, 0666);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.h:109:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char actionName[64];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.h:117:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char eventName[64];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.h:118:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char actionName[64];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulparse.c:172:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(assoc->rsv3, buf, 32);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulparse.c:323:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(subItem->data, buf, subItem->length);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulparse.c:717:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(role->SOPClassUID, buf, UIDLength);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:159:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char node[128];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:171:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hBuffer[512];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:202:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  (void) memcpy(&server.sin_addr, hp->h_addr, (unsigned long) hp->h_length);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:1286:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char title[40];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:2191:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hBuf[512];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:2275:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	(void) sprintf(params->callingPresentationAddress, "%-d.%-d.%-d.%-d",
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:2281:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char node[128];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:2601:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void) memcpy(outputAddress, paramAddress, paramLength);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.h:96:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char applicationContextName[DUL_LEN_NAME + 1];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.h:97:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char callingAPTitle[DUL_LEN_TITLE + 1];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.h:98:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char calledAPTitle[DUL_LEN_TITLE + 1];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.h:99:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char respondingAPTitle[DUL_LEN_TITLE + 1];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.h:104:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char callingPresentationAddress[64];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.h:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char calledPresentationAddress[64];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.h:110:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char callingImplementationClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.h:111:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char callingImplementationVersionName[16 + 1];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.h:112:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char calledImplementationClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.h:113:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char calledImplementationVersionName[16 + 1];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.h:133:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char abstractSyntax[DUL_LEN_UID + 1];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.h:135:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char acceptedTransferSyntax[DUL_LEN_UID + 1];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.h:143:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char transferSyntax[DUL_LEN_UID + 1];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:401:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[BUFFERSIZE];	/* Buffer for reads from files */
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:419:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd_itoa = open(itoa_file, O_RDONLY, 0)) == NULL)
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:422:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd_atoi = open(atoi_file, O_RDONLY, 0)) == NULL)
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:774:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char ring_buf[RING_SIZE];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:903:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char ring_buf[RING_SIZE];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1073:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&ring_buf[*write_ptr], buffer, RING_SIZE - *write_ptr);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1074:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ring_buf, &buffer[RING_SIZE - *write_ptr],
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1084:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(&ring_buf[*write_ptr], buffer, bufsize);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1153:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, &ring_buf[read_ptr + offset], len);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1156:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(buf, &ring_buf[read_ptr + offset], RING_SIZE - (read_ptr + offset));
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1157:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(buf, ring_buf, len - (RING_SIZE - (read_ptr + offset)));
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:1159:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(buf, &ring_buf[(read_ptr + offset) % RING_SIZE], len);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulstructures.h:83:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char keyType[40];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulstructures.h:84:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char networkType[40];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulstructures.h:101:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char keyType[40];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulstructures.h:102:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char networkType[40];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulstructures.h:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char remoteNode[64];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulstructures.h:117:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char calledAPTitle[20];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulstructures.h:118:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char callingAPTitle[20];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulstructures.h:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char applicationContextName[68];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulstructures.h:120:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char abstractSyntaxName[68];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulstructures.h:133:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char pduHead[6];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulstructures.h:172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulstructures.h:195:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char implementationClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulstructures.h:202:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char implementationVersionName[16 + 1];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulstructures.h:211:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulstructures.h:248:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char rsv2[2];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulstructures.h:249:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char calledAPTitle[18];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulstructures.h:250:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char callingAPTitle[18];
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulstructures.h:251:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char rsv3[32];
data/ctn-3.2.0~dfsg/facilities/fis/event.c:120:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char application[20];
data/ctn-3.2.0~dfsg/facilities/fis/event.c:168:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char application[20];
data/ctn-3.2.0~dfsg/facilities/fis/event.c:219:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:91:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char PatID[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:92:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char PatNam[DICOM_PN_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:93:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char PatUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:94:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char PatBirDat[DICOM_DA_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:95:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char PatSex[2];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:110:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char VisUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:111:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char PatUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:112:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char RefPhyNam[DICOM_PN_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:138:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char PatUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:139:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StuInsUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:140:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char VisUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:141:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char AccNum[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StuID[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:143:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SchStuStaDat[DICOM_DA_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:144:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SchStuStaTim[DICOM_TM_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:145:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SchStuLoc[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:146:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ProDes[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:147:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ReqPro[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:148:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StuStaID[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:149:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SchStuLocAE[DICOM_AE_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:150:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StuReaDat[DICOM_DA_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:151:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StuReaTim[DICOM_TM_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:171:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StuComUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StuInsUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:173:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Mod[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:174:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StuDes[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:175:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ProCodVal[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:176:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ProCodSchDes[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:177:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ProCodMea[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:178:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StuComStaID[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:179:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StuID[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:196:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SerInsUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:197:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StuComUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:198:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SerDat[DICOM_DA_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:199:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SerTim[DICOM_TM_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char RetAETit[DICOM_AE_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:201:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StoMedFilSetID[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:202:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StoMedFilSetUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:218:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SOPInsUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:219:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SerInsUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:220:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StuComUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:221:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SOPClaUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:222:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char RetAETit[DICOM_AE_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:223:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StoMedFilSetID[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:224:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StoMedFilSetUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:240:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ResUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:241:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StuInsUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:242:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ResID[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:243:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Imp[DICOM_ST_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:244:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char InsCreDat[DICOM_DA_LENGTH+1];		/* Instance Creation Date */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:245:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char InsCreTim[DICOM_TM_LENGTH+1];		/* Instance Creation Time */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:246:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char InsCreUID[DICOM_UI_LENGTH+1];		/* Instance Creator UID */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:270:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char IntUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:271:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ResUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:272:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char IntID[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:273:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char IntTex[DICOM_ST_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:274:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char IntTypID[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:275:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char IntStaID[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:276:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char IntDiaDes[DICOM_LT_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:277:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char InsCreDat[DICOM_DA_LENGTH+1];		/* Instance Creation Date */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:278:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char InsCreTim[DICOM_TM_LENGTH+1];		/* Instance Creation Time */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:279:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char InsCreUID[DICOM_UI_LENGTH+1];		/* Instance Creator UID */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:280:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char PhyAppInt[DICOM_PN_LENGTH+1];		/* Physician Approving Interp */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:281:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char IntAppDat[DICOM_DA_LENGTH+1];		/* Interp approval date */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:282:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char IntAppTim[DICOM_TM_LENGTH+1];		/* Interp approval time */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:303:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char TraUID[DICOM_UI_LENGTH+1];     /* Transaction UID */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:304:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ReqAE[DICOM_AE_LENGTH+1];      /* Requesting AE title */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:305:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ResAE[DICOM_AE_LENGTH+1];      /* Responding AE title */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:306:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ReqDat[DICOM_DT_LENGTH+1];     /* Date of the request */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:307:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ReqTim[DICOM_TM_LENGTH+1];     /* Time of the request */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:308:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ResDat[DICOM_DT_LENGTH+1];     /* Date of the response */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:309:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ResTim[DICOM_TM_LENGTH+1];     /* Time of the response */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:320:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char TraUID[DICOM_UI_LENGTH+1];     /* Transaction UID */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:321:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char SOPClaUID[DICOM_UI_LENGTH+1];  /* SOP Class UID */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:322:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char SOPInsUID[DICOM_UI_LENGTH+1];  /* SOP Instance UID */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:335:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char TasNam[101];                   /* Task Name */
data/ctn-3.2.0~dfsg/facilities/fis/fis.h:336:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char TasID[101];                    /* Task Identifier */
data/ctn-3.2.0~dfsg/facilities/fis/fisget.c:479:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localString[1024];
data/ctn-3.2.0~dfsg/facilities/fis/fisget.c:1536:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/fis/record.c:176:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(record->PatID, "ID%-08d", patientNumber);
data/ctn-3.2.0~dfsg/facilities/fis/record.c:224:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(record->AccNum, "ID%-08d", id);
data/ctn-3.2.0~dfsg/facilities/fis/record.c:232:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(record->StuID, "ID%-08d", id);
data/ctn-3.2.0~dfsg/facilities/fis/record.c:291:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(record->ResID, "RES%-08d", id);
data/ctn-3.2.0~dfsg/facilities/fis/record.c:338:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(record->IntID, "INT%-08d", id);
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:144:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sysline[50];
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:225:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *fopen(),		/* for file access			 */
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:246:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    if ((fd = fopen(fname, "w")) == NULL) {
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:412:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ep, (char *) element, QPTRS->GQ_elementsize);
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:503:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *) element, ep, QPTRS->GQ_elementsize);
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:554:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *fopen(),
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:565:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = fopen(fname, "r")) == NULL) {
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:743:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *) element, ep, QPTRS->GQ_elementsize);
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:804:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *) element, ep, QPTRS->GQ_elementsize);
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:811:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ep, (char *) element, QPTRS->GQ_elementsize);
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:934:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[GQ_MAXSTRINGLENGTH];
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:935:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *p,
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:953:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(temp, "%d", qid);
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:1047:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *fopen(),
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:1058:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = fopen(fname, "r")) == NULL) {
data/ctn-3.2.0~dfsg/facilities/hap/hap.c:198:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/facilities/hap/hap.c:311:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.c:297:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:221:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:228:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:235:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:240:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:243:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:261:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:268:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:273:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:276:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:295:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:316:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:324:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:329:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:334:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:336:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:348:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:366:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:373:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:389:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:396:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:401:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:404:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:414:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:421:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:424:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:438:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisdb.h:454:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisprivate.h:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisprivate.h:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/his/hisprivate.h:111:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dbkey[HIS_MAXKEYLENGTH];
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_file.c:120:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((GS_hunkfd = open(fname, O_RDWR | O_CREAT, 0777)) < 0)
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_file.c:257:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((GS_hunkfd = open(fname, O_RDWR)) < 0)
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_file.c:1038:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) buffer,
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_file.c:1046:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((char *) pbuffer,
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_file.c:1055:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) pbuffer,
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_file.c:1151:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) GS_curhunk.buf_pool[add->node_number].buf,
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_file.c:1159:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((char *) GS_curhunk.buf_pool[current_node].buf,
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_file.c:1168:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) GS_curhunk.buf_pool[current_node].buf,
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_file.h:34:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_man.c:172:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((GS_hunkfd = open(fname, openFlags, 0777)) < 0)
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_man.c:344:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((GS_hunkfd = open(fname, openFlags)) < 0)
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_man.c:1120:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) buffer,
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_man.c:1128:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((char *) pbuffer,
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_man.c:1137:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) pbuffer,
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_man.c:1233:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) GS_curhunk.buf_pool[add->node_number].buf,
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_man.c:1241:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((char *) GS_curhunk.buf_pool[current_node].buf,
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_man.c:1250:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) GS_curhunk.buf_pool[current_node].buf,
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_man.h:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/iap/iap.c:395:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/facilities/iap/iap.c:508:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char
data/ctn-3.2.0~dfsg/facilities/icon/icon.c:107:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(file, O_WRONLY | O_APPEND)) < 0)
data/ctn-3.2.0~dfsg/facilities/icon/icon.c:109:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(file, O_WRONLY | O_APPEND | O_CREAT);
data/ctn-3.2.0~dfsg/facilities/icon/icon.c:111:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(file, O_WRONLY | O_APPEND | O_CREAT, 0666);
data/ctn-3.2.0~dfsg/facilities/icon/icon.c:159:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(file, O_RDONLY);
data/ctn-3.2.0~dfsg/facilities/icon/icon.c:296:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(file, O_WRONLY | O_APPEND)) < 0)
data/ctn-3.2.0~dfsg/facilities/icon/icon.c:298:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(file, O_WRONLY | O_APPEND | O_CREAT);
data/ctn-3.2.0~dfsg/facilities/icon/icon.c:300:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(file, O_WRONLY | O_APPEND | O_CREAT, 0666);
data/ctn-3.2.0~dfsg/facilities/icon/icon.c:349:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(file, O_RDONLY);
data/ctn-3.2.0~dfsg/facilities/icon/icon.c:407:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(file, O_RDONLY);
data/ctn-3.2.0~dfsg/facilities/icon/icon.h:61:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/icon/icon.h:75:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/icon/icon.h:78:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/icpy/icpy.h:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SourceApplication[17];
data/ctn-3.2.0~dfsg/facilities/icpy/icpy.h:65:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char DestinationApplication[17];
data/ctn-3.2.0~dfsg/facilities/icpy/icpy.h:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ForwardingApplication[17];
data/ctn-3.2.0~dfsg/facilities/icpy/icpy.h:72:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Accession[17];
data/ctn-3.2.0~dfsg/facilities/icpy/icpy.h:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Source[17];
data/ctn-3.2.0~dfsg/facilities/icpy/icpy.h:74:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Destination[17];
data/ctn-3.2.0~dfsg/facilities/icpy/icpy.h:75:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Modality[3];
data/ctn-3.2.0~dfsg/facilities/icpy/icpy.h:76:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SOPInstanceUID[65];
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:145:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:163:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:186:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:205:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:228:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:946:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:1766:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:1897:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		if ((temp = (char *) malloc(strlen(GS_StuNodes[i].StuInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:1956:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		if ((temp = (char *) malloc(strlen(GS_SerNodes[i].SerInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2243:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2360:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		if ((temp = (char *) malloc(strlen(GS_PatNodes[i].PatID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2418:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		if ((temp = (char *) malloc(strlen(GS_StuNodes[i].StuInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2478:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		if ((temp = (char *) malloc(strlen(GS_SerNodes[i].SerInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2776:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2856:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		if ((temp = (char *) malloc(strlen(GS_SerNodes[i].SerInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:5037:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(GS_IMASEL_SOPInsUIDList, "( SOPInsUID in ( ");
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:5044:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(GS_IMASEL_SOPInsUIDList, "temp->UID");
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:5052:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat(GS_IMASEL_SOPInsUIDList, " )) ");
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:5222:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:5883:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:90:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:100:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:110:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:124:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:131:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:136:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:146:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:153:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:161:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:169:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:179:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:192:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:199:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:318:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:324:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:331:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:342:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:349:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:357:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:364:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:377:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idb/idb.h:382:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:149:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:168:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:191:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:210:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:233:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:1011:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp_date[DICOM_DA_LENGTH+2];
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:1012:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp_time[DICOM_TM_LENGTH+2];
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:1091:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp_date[DICOM_DA_LENGTH+2];
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:1092:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp_time[DICOM_TM_LENGTH+2];
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:1188:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char s[10] = "";
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:1224:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp_date[DICOM_DA_LENGTH+2];
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:1225:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp_time[DICOM_TM_LENGTH+2];
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:1345:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp_date[DICOM_DA_LENGTH+2];
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:1346:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp_time[DICOM_TM_LENGTH+2];
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:1437:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp_date[DICOM_DA_LENGTH+2];
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:1438:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp_time[DICOM_TM_LENGTH+2];
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:1969:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:2776:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:2906:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		if ((temp = (char *) malloc(strlen(GS_StuNodes[i].StuInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:2964:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		if ((temp = (char *) malloc(strlen(GS_SerNodes[i].SerInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3246:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3377:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		if ((temp = (char *) malloc(strlen(GS_PatNodes[i].patID.text) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3441:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		if ((temp = (char *) malloc(strlen(GS_StuNodes[i].StuInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3500:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		if ((temp = (char *) malloc(strlen(GS_SerNodes[i].SerInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3828:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3910:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		if ((temp = (char *) malloc(strlen(GS_SerNodes[i].SerInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:6168:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(GS_IMASEL_SOPInsUIDList, "( SOPInsUID in ( ");
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:6175:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(GS_IMASEL_SOPInsUIDList, "temp->UID");
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:6183:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat(GS_IMASEL_SOPInsUIDList, " )) ");
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:6240:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char s[10] = "";
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:6416:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:6931:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:93:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char personName[256];
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:98:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char text[256];
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:103:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char text[128];
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:109:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:126:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:137:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:151:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:167:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:177:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:184:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:192:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:210:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:223:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:230:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:353:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:359:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:363:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:373:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:384:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:393:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:401:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:408:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:421:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:426:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.h:446:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char charSet[128];
data/ctn-3.2.0~dfsg/facilities/info_entity/dicom_ie.h:162:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char moduleDescription[48];
data/ctn-3.2.0~dfsg/facilities/info_entity/dicom_ie.h:172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ieDescription[64];
data/ctn-3.2.0~dfsg/facilities/info_entity/dicom_ie.h:181:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/info_entity/dicom_ie.h:182:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char objectDescription[64];
data/ctn-3.2.0~dfsg/facilities/info_entity/ie.c:1634:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/info_entity/ie.c:1693:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/irs/dicom_irs.h:87:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char PatID[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/irs/dicom_irs.h:88:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char PatNam[DICOM_PN_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/irs/dicom_irs.h:89:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StuUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/irs/dicom_irs.h:90:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char AccNum[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/irs/dicom_irs.h:91:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char StuDat[DICOM_DA_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/irs/dicom_irs.h:92:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char InsAET[DICOM_AE_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/irs/dicom_irs.h:94:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char UpdPatID[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/irs/dicom_irs.h:95:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char UpdPatNam[DICOM_PN_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/irs/dicom_irs.h:96:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char UpdAccNum[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/irs/dicom_irs.h:98:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Operator[65];
data/ctn-3.2.0~dfsg/facilities/irs/dicom_irs.h:99:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Comments[81];
data/ctn-3.2.0~dfsg/facilities/irs/dicom_irs.h:100:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Status[41];
data/ctn-3.2.0~dfsg/facilities/irs/dicom_irs.h:102:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char UpdReqDat[DICOM_DA_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/irs/dicom_irs.h:103:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char UpdReqTim[DICOM_TM_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/irs/dicom_irs.h:104:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char UpdComDat[DICOM_DA_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/irs/dicom_irs.h:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char UpdComTim[DICOM_TM_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:253:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dicomDate[DICOM_DA_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:254:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dicomTime[DICOM_TM_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:255:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char status[41];
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:496:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dateText[128];
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:497:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char timeText[128];
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:498:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char status[41];
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:521:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(status, "COMPLETE");
data/ctn-3.2.0~dfsg/facilities/manage/control.c:513:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/manage/control.c:585:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(rtnFileName, ".dcm");
data/ctn-3.2.0~dfsg/facilities/manage/control.c:600:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/manage/control.c:669:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(rtnFileName, ".dcm");
data/ctn-3.2.0~dfsg/facilities/manage/control.c:738:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fullName1[512 + 1];
data/ctn-3.2.0~dfsg/facilities/manage/control.c:740:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fullName1[MAXHOSTNAMELEN + 1];
data/ctn-3.2.0~dfsg/facilities/manage/control.c:780:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/manage/control.c:890:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char
data/ctn-3.2.0~dfsg/facilities/manage/control.c:892:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(strOfGQId, "%d", gqID);
data/ctn-3.2.0~dfsg/facilities/manage/dmanprivate.h:61:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char requestingTitle[17];
data/ctn-3.2.0~dfsg/facilities/manage/dmanprivate.h:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char respondingTitle[17];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:79:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Title[17];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:80:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Node[65];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:81:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Comment[81];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:83:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Organization[33];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:93:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Title[17];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:94:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char GroupName[17];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:109:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Title[17];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:110:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char DbKey[65];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:111:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Owner[17];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:112:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char GroupName[17];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:113:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Comment[81];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char RequestingTitle[17];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:126:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char RespondingTitle[17];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:127:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Medium[33];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:128:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Root[256];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:138:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char RequestingTitle[17];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:139:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char RespondingTitle[17];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:154:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Title[17];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:155:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char DbKey[65];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:156:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Owner[17];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:157:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char GroupName[17];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:158:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Comment[81];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:169:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char RequestingTitle[17];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:170:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char RespondingTitle[17];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:182:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char RequestingTitle[17];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:183:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char RespondingTitle[17];
data/ctn-3.2.0~dfsg/facilities/manage/manage.h:184:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ImageType[7];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char description[64];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:224:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:234:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:244:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:256:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:257:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errorComment[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:267:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:288:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:289:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errorComment[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:298:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char moveDestination[20];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:300:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:305:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char UID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:336:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:337:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errorComment[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:359:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:360:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char instanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:361:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char moveAETitle[20];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:374:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:375:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char instanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:378:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errorComment[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:387:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:388:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char affectedInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:407:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:408:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char affectedInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:412:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char requestedClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:413:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char requestedInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:414:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errorComment[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:423:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:424:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char requestedInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:440:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:441:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char affectedInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:447:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char requestedClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:448:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char requestedInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:449:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errorComment[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:458:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:459:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char instanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:474:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:475:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char instanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:481:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char requestedClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:482:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char requestedInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:483:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errorComment[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:495:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:496:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char instanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:515:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:516:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char instanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:521:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errorComment[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:533:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:534:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char instanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:552:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:553:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char instanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:560:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errorComment[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:570:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:571:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char instanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:586:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:587:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char instanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:592:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errorComment[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:599:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/dicom_messages.h:600:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char instanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/messages/messages.c:1234:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(table->structure, msg, table->structureSize);
data/ctn-3.2.0~dfsg/facilities/messages/messages.c:1358:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(msg, table->structure, table->structureSize);
data/ctn-3.2.0~dfsg/facilities/motif_utl/motifutil.c:196:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char text[1024];
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:277:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(name, O_RDONLY | O_BINARY);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:279:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(name, O_RDONLY);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:282:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mapName[1024];
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:286:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(mapName, O_RDONLY | O_BINARY);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:288:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(mapName, O_RDONLY);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:291:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    fd = open(mapName, O_RDONLY);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1010:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    (void) memcpy(element->d.ot, q, l);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1042:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[64] = "";
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1043:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char b[64] = "";
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1082:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(tmp, "<Unimplemented>");
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1085:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(tmp, "%d", *e.d.sl);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1088:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(tmp, "<Unimplemented>");
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1091:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(tmp, "%d", *e.d.ss);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1094:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(tmp, "%d", *e.d.ul);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1097:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(tmp, "<Unimplemented>");
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1100:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(tmp, "%d", *e.d.us);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1109:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(tmp, "<Unimplemented>");
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1205:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		(void) memcpy(element->d.ot, q, l);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1616:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1821:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1825:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localPrefix[128];
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:2053:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:2063:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(file, O_WRONLY | O_CREAT | O_TRUNC);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:2068:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(file, O_WRONLY | O_CREAT | O_TRUNC, 0666);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:2787:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3080:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    (void) memcpy(groupLengthItem->element.d.ot, &l, sizeof(l));
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3154:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    (void) memcpy(p, element->d.string, element->length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3159:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    (void) memcpy(p, element->d.string, element->length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3164:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    (void) memcpy(p, element->d.string, element->length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3169:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    (void) memcpy(p, element->d.string, element->length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3174:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    (void) memcpy(p, element->d.string, element->length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3179:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    (void) memcpy(p, element->d.string, element->length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3184:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    (void) memcpy(p, element->d.string, element->length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3189:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    (void) memcpy(p, element->d.string, element->length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3194:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    (void) memcpy(p, element->d.string, element->length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3199:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    (void) memcpy(p, element->d.string, element->length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3204:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    (void) memcpy(p, element->d.string, element->length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3209:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    (void) memcpy(p, element->d.string, element->length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3214:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    (void) memcpy(p, element->d.string, element->length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3219:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    (void) memcpy(p, element->d.string, element->length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3232:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void) memcpy(newItem->element.d.ot, element->d.ot, element->length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3270:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void) memcpy(nextItem->element.d.ot, &groupItem->baseLength,
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3353:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(nextItem->element.d.ot, &groupItem->baseLength,
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3502:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char code[3];
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3637:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(dst, (*obj)->preamble, DCM_PREAMBLELENGTH);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3639:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(dst, "DICM", 4);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3812:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ch[4];
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3843:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char b[512];
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3844:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(b, "byte count: %d %d, errno: %d", nBytes, length, errno);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3892:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    (void) memcpy(b, p, length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3948:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    (void) memcpy(b, p, length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3961:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    (void) memcpy(b, p, length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3981:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    (void) memcpy(b, p, length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:4024:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char b[512];
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:4025:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(b, "byte count: %d %d, errno: %d", nBytes, length, errno);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:4212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char b[512];
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:4213:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(b, "byte count: %d %d, errno: %d", nBytes, length, errno);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:4436:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char xferSyntax[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:5142:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:5475:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    (void) memcpy(elementItem->element.d.ot, ptr,
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:5612:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char label[4];
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:5642:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void) memcpy((*object)->preamble, *ptr, DCM_PREAMBLELENGTH);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:5671:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4];
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:5753:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4];
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:5754:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char vrCode[3];
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:5902:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char localVR[10];
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:6201:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    (void) memcpy((*elementItem)->element.d.ot, *ptr,
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:6823:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void) memcpy(to->d.ot, q, l);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:6836:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[24];
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:7558:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(fragmentItem->fragment, fragment, fragmentLength);
data/ctn-3.2.0~dfsg/facilities/objects/dcmdict.c:80:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char englishDescription[48];
data/ctn-3.2.0~dfsg/facilities/objects/dcmdict.c:2433:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    (void) strcpy(element->description, "Unknown group length");
data/ctn-3.2.0~dfsg/facilities/objects/dcmprivate.h:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char keyType[32];
data/ctn-3.2.0~dfsg/facilities/objects/dcmprivate.h:96:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[1024];
data/ctn-3.2.0~dfsg/facilities/objects/dcmprivate.h:102:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char preamble[DCM_PREAMBLELENGTH];
data/ctn-3.2.0~dfsg/facilities/objects/dcmprivate.h:106:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char waveformDataVR[DICOM_CS_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/objects/dcmprivate.h:116:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char u[2];
data/ctn-3.2.0~dfsg/facilities/objects/dcmprivate.h:121:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char u[4];
data/ctn-3.2.0~dfsg/facilities/objects/dcmsupport.c:142:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void) memcpy(p, c, length);
data/ctn-3.2.0~dfsg/facilities/objects/dicom_objects.h:122:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char description[48];
data/ctn-3.2.0~dfsg/facilities/objects/dicom_objects.h:177:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char preamble[DCM_PREAMBLELENGTH];
data/ctn-3.2.0~dfsg/facilities/objects/dicom_objects.h:178:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char fileMetaInformationVersion[2];
data/ctn-3.2.0~dfsg/facilities/objects/dicom_objects.h:179:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mediaStorageSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/objects/dicom_objects.h:180:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mediaStorageSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/objects/dicom_objects.h:181:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char transferSyntaxUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/objects/dicom_objects.h:182:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char implementationClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/objects/dicom_objects.h:183:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char implementationVersionName[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/objects/dicom_objects.h:184:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sourceApplicationEntityTitle[DICOM_AE_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/objects/dicom_objects.h:185:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char privateInformationCreatorUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:137:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filmSessionSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:138:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filmSessionSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:139:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char copies[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:140:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char priority[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:141:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mediumType[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filmDestination[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:143:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filmSessionLabel[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:144:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char memoryAllocation[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:216:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filmBoxSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:217:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filmBoxSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:218:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedFilmSessionSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:219:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedFilmSessionSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:221:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char imageDisplayFormat[DICOM_LT_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:223:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char imageDisplayFormat[DICOM_ST_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:225:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char annotationDisplayFormatID[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:226:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filmOrientation[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:227:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filmSizeID[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:228:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char magnificationType[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:229:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char smoothingType[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:230:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char borderDensity[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:231:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char emptyImageDensity[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:233:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char minDensity[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:234:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char maxDensity[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:239:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char trim[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:240:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char configurationInfo[DICOM_ST_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:243:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char refPrintJobClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:244:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char refPrintJobInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:291:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char imageBoxSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:292:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char imageBoxSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:294:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char polarity[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:295:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char magnificationType[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:296:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char smoothingType[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:298:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char magnificationFactor[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:300:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char requestedImageSize[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:336:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char annotationBoxSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:337:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char annotationBoxSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:339:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char annotationPosition[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:343:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char textString[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:377:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char printJobSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:378:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char printJobSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:379:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char executionStatus[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:380:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char executionStatusInfo[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:381:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char creationDate[DICOM_DA_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:382:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char creationTime[DICOM_TM_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:383:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char printPriority[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:384:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char printerName[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:385:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char originator[DICOM_AE_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:422:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char printerSOPclassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:423:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char printerSOPinstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:424:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char status[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:425:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char statusInfoCode[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:426:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:427:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char manufacturer[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:428:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char manufacturerModelName[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:429:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char deviceSerialNumber[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:430:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char softwareVersion[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:431:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dateOfLastCalibration[DICOM_DA_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:432:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char timeOfLastCalibration[DICOM_TM_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:472:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pixelratio[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:506:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pixelratio[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:536:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char displayFormat[20];	/* stores the image display format e.g.
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:548:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bibInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:553:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char babInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:558:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bfbInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/dicom_print.h:565:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bfsInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/print/print.c:470:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(table->structure, film, table->structureSize);
data/ctn-3.2.0~dfsg/facilities/print/print.c:828:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void) memcpy(filmStruct, table->structure, table->structureSize);
data/ctn-3.2.0~dfsg/facilities/services/cmd_valid.c:90:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/services/find.c:187:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/services/find.c:426:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/services/find.c:455:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/services/get.c:256:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/services/get.c:472:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/services/get.c:504:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/services/get.c:898:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/services/get.c:925:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(fileName, O_BINARY | O_CREAT | O_WRONLY | O_TRUNC, S_IREAD | S_IWRITE);
data/ctn-3.2.0~dfsg/facilities/services/get.c:927:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(fileName, O_CREAT | O_WRONLY | O_TRUNC, 0666);
data/ctn-3.2.0~dfsg/facilities/services/move.c:189:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/services/move.c:428:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/services/move.c:458:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/services/send.c:110:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/services/send.c:191:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/services/send.c:285:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[16384];
data/ctn-3.2.0~dfsg/facilities/services/services.c:108:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/services/services.c:114:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char
data/ctn-3.2.0~dfsg/facilities/services/services.c:941:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/services/services.c:997:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void) memcpy(s, pdv.data, pdv.fragmentLength);
data/ctn-3.2.0~dfsg/facilities/services/services.c:1117:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/services/services.c:1199:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/services/services.c:1300:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/services/services.c:1317:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/services/services.c:1372:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void) memcpy(s, pdv.data, pdv.fragmentLength);
data/ctn-3.2.0~dfsg/facilities/services/services.c:1511:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/services/services.c:1569:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void) memcpy(s, pdv.data, pdv.fragmentLength);
data/ctn-3.2.0~dfsg/facilities/services/services.c:1843:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    *fd = open(qualifiedFile, O_CREAT | O_WRONLY | O_TRUNC, 0666);
data/ctn-3.2.0~dfsg/facilities/services/srv1.c:113:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/services/srv1.c:289:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char paramName[1024];
data/ctn-3.2.0~dfsg/facilities/services/srv1.c:325:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char paramName[1024] = "";
data/ctn-3.2.0~dfsg/facilities/services/srv2.c:188:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/services/srv2.c:245:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void) memcpy(s, pdv.data, pdv.fragmentLength);
data/ctn-3.2.0~dfsg/facilities/services/srv2.c:383:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/services/srv2.c:400:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/services/srv2.c:451:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void) memcpy(s, pdv.data, pdv.fragmentLength);
data/ctn-3.2.0~dfsg/facilities/services/srv2.c:480:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  char scratch[1024];
data/ctn-3.2.0~dfsg/facilities/services/srv2.c:482:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	  strcat(scratch, "/ctn_bad_dataset.dcm");
data/ctn-3.2.0~dfsg/facilities/services/srv2.c:487:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  fd1 = open(scratch, O_WRONLY | O_CREAT | O_TRUNC, 0666);
data/ctn-3.2.0~dfsg/facilities/services/srv2.c:562:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char
data/ctn-3.2.0~dfsg/facilities/services/srv2.c:620:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void) memcpy(s, pdv.data, pdv.fragmentLength);
data/ctn-3.2.0~dfsg/facilities/services/srv2.c:756:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[128];
data/ctn-3.2.0~dfsg/facilities/services/srv2.c:777:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "DUL Error: %08x\n", cond);
data/ctn-3.2.0~dfsg/facilities/services/srv2.c:837:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    *fd = open(qualifiedFile, O_CREAT | O_WRONLY | O_TRUNC, 0666);
data/ctn-3.2.0~dfsg/facilities/services/storage.c:140:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[2048];
data/ctn-3.2.0~dfsg/facilities/services/storage.c:174:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(fileMeta->sourceApplicationEntityTitle, "XX");
data/ctn-3.2.0~dfsg/facilities/services/storage.c:539:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(fileName, O_CREAT | O_WRONLY | O_TRUNC, 0666);
data/ctn-3.2.0~dfsg/facilities/services/storage.c:568:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(storeReply->errorComment,
data/ctn-3.2.0~dfsg/facilities/snp/decode.c:566:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(tcp_item->data, tcp_data, data_len);
data/ctn-3.2.0~dfsg/facilities/snp/decode.h:93:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[4];		/* first word of data */
data/ctn-3.2.0~dfsg/facilities/snp/dlroutines.c:446:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char errmsg[80];
data/ctn-3.2.0~dfsg/facilities/snp/dlroutines.c:537:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char primbuf[80];
data/ctn-3.2.0~dfsg/facilities/snp/dlroutines.c:564:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	(void) sprintf(primbuf, "unknown primitive 0x%x", prim);
data/ctn-3.2.0~dfsg/facilities/snp/snp.c:326:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(handle->ini_addr, host->h_addr, 4);
data/ctn-3.2.0~dfsg/facilities/snp/snp.c:338:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(handle->acc_addr, host->h_addr, 4);
data/ctn-3.2.0~dfsg/facilities/snp/snp.c:347:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((handle->fd_in = open(device, 2)) < 0)
data/ctn-3.2.0~dfsg/facilities/snp/snp.c:725:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(for_port.Pf_Filter, port_filt, 16);
data/ctn-3.2.0~dfsg/facilities/snp/snp.c:744:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ini_add2_filt[1], &(handle->ini_addr[2]), 2);
data/ctn-3.2.0~dfsg/facilities/snp/snp.c:745:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ini_add2_filt[5], &(handle->ini_addr[2]), 2);
data/ctn-3.2.0~dfsg/facilities/snp/snp.c:746:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(for_ini_add2.Pf_Filter, ini_add2_filt, 16);
data/ctn-3.2.0~dfsg/facilities/snp/snp.c:765:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&acc_add2_filt[1], &(handle->acc_addr[2]), 2);
data/ctn-3.2.0~dfsg/facilities/snp/snp.c:766:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&acc_add2_filt[5], &(handle->acc_addr[2]), 2);
data/ctn-3.2.0~dfsg/facilities/snp/snp.c:767:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(for_acc_add2.Pf_Filter, acc_add2_filt, 16);
data/ctn-3.2.0~dfsg/facilities/snp/snp.c:786:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ini_add1_filt[1], &(handle->ini_addr[0]), 2);
data/ctn-3.2.0~dfsg/facilities/snp/snp.c:787:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ini_add1_filt[5], &(handle->ini_addr[0]), 2);
data/ctn-3.2.0~dfsg/facilities/snp/snp.c:788:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(for_ini_add1.Pf_Filter, ini_add1_filt, 16);
data/ctn-3.2.0~dfsg/facilities/snp/snp.c:806:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&acc_add1_filt[1], &(handle->acc_addr[0]), 2);
data/ctn-3.2.0~dfsg/facilities/snp/snp.c:807:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&acc_add1_filt[5], &(handle->acc_addr[0]), 2);
data/ctn-3.2.0~dfsg/facilities/snp/snp.c:808:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(for_acc_add1.Pf_Filter, acc_add1_filt, 16);
data/ctn-3.2.0~dfsg/facilities/snp/snp.c:823:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(for_tcp.Pf_Filter, tcp_filt, 12);
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:127:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:128:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:135:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:136:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:143:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:144:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:151:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:152:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:159:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:160:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:169:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char photometricInterpretation[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pixelAspectRatio[2 * (DICOM_IS_LENGTH + 1)];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:186:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char photometricInterpretation[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:190:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pixelAspectRatio[2 * (DICOM_IS_LENGTH + 1)];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:202:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char refSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:203:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char refSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:209:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeValue[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:210:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codingSchemeDesignator[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:211:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeMeaning[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:217:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeValue[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:218:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codingSchemeDesignator[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:219:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeMeaning[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:225:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char refSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:226:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char refSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:232:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char approvalDates[DICOM_DA_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:233:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char approvalTimes[DICOM_TM_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:234:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char physiciansApproving[DICOM_PN_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:246:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char seriesDate[DICOM_DA_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:247:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char seriesTime[DICOM_TM_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:248:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char seriesInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:249:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char retrieveAETitle[DICOM_AE_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:250:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char storageMediaFileSetID[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:251:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char storageMediaFileSetUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:263:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char refSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:264:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char refSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:265:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char retrieveAETitle[DICOM_AE_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:266:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char storageMediaFileSetID[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:267:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char storageMediaFileSetUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:274:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char refSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:275:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char refSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:282:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char refSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:283:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char refSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:290:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char refSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:291:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char refSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:306:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lutExplanation[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:317:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeValue[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:318:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codingSchemeDesignator[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:319:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeMeaning[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:328:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeValue[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:329:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codingSchemeDesignator[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:330:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeMeaning[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:338:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeValue[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:339:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codingSchemeDesignator[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:340:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeMeaning[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:349:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeValue[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:350:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codingSchemeDesignator[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:351:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeMeaning[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:360:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeValue[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:361:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codingSchemeDesignator[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:362:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeMeaning[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:371:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeValue[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:372:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codingSchemeDesignator[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:373:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeMeaning[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:382:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeValue[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:383:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codingSchemeDesignator[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:384:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeMeaning[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:393:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char energyWindowName[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:403:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char energyWindowLowerLimit[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:404:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char energyWindowUpperLimit[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:423:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char radioPharmaceuticalRoute[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:425:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char radioPharmaceuticalVolume[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:426:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char radioPharmaceuticalStartTime[DICOM_TM_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:427:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char radioPharmaceuticalStopTime[DICOM_TM_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:428:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char radioNuclideTotalDose[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:430:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char radioPharmaceutical[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:439:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeValue[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:440:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codingSchemeDesignator[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:441:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeMeaning[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:449:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeValue[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:450:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codingSchemeDesignator[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:451:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeMeaning[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:461:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char syringeCounts[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:462:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char residualSyringeCounts[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:470:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeValue[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:471:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codingSchemeDesignator[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:472:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeMeaning[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:484:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char interventionDrugName[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:486:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char interventionDrugStartTime[DICOM_TM_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:487:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char interventionDrugStopTime[DICOM_TM_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:488:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char interventionDrugDose[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:496:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeValue[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:497:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codingSchemeDesignator[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:498:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeMeaning[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:519:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char collimatorGridName[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:520:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char collimatorType[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:521:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fieldOfViewShape[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:522:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fieldOfViewDimensions[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:523:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char focalDistance[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:524:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char xFocusCenter[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:525:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char yFocusCenter[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:526:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zoomCenter[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:527:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zoomFactor[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:528:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char centerForRotationOffset[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:529:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char gantryDetectorTilt[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:530:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char distanceSrcToDetector[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:531:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char startAngle[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:532:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char radialPosition[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:533:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char imageOrientationPatient[6*(DICOM_DS_LENGTH + 1)];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:534:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char imagePositionPatient[3*(DICOM_DS_LENGTH + 1)];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:544:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeValue[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:545:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codingSchemeDesignator[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:546:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeMeaning[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:555:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeValue[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:556:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codingSchemeDesignator[DICOM_SH_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:557:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char codeMeaning[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:568:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char startAngle[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:569:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char angularStep[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:570:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char rotationDirection[DICOM_CS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:571:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char scanArc[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:572:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char actualFrameDuration[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:573:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char radialPosition[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:574:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char distanceSrcToDetector[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:576:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tableTraverse[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:577:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tableHeight[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:587:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char triggerTime[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:588:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char framingType[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:602:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char frameTime[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:603:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char nominalInterval[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:604:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lowRRValue[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:605:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char highRRValue[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:606:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char intervalsAcquired[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:607:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char intervalsRejected[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:616:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char timeSlotTime[DICOM_DS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:625:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char phaseDelay[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:626:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char actualFrameDuration[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:627:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pauseBetweenFrames[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:629:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char triggerVector[DICOM_IS_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:643:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lutExplanation[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:644:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char modalityLUTType[DICOM_LO_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:654:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedSOPClassUID[DICOM_UI_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:655:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedSOPInstanceUID[DICOM_UI_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:656:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char storageMediaID[DICOM_SH_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:657:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char storageMediaUID[DICOM_UI_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:664:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedSOPClassUID[DICOM_UI_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:665:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedSOPInstanceUID[DICOM_UI_LENGTH+1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:673:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedSOPClassUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/dicom_sq.h:674:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char referencedSOPInstanceUID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/sq/sequences.c:1613:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void) memcpy(sqTable->structure, node, sqTable->structureSize);
data/ctn-3.2.0~dfsg/facilities/sq/sequences.c:1815:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(void) memcpy(structure, sqTable->structure, sqTable->structureSize);
data/ctn-3.2.0~dfsg/facilities/tbl/sybase.c:582:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char
data/ctn-3.2.0~dfsg/facilities/tbl/sybase.c:776:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char
data/ctn-3.2.0~dfsg/facilities/tbl/sybase.c:1061:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:201:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:548:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    *(fp->Value.Value.Signed2) = atoi(row[i]);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:559:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    *(fp->Value.Value.Unsigned2) = atoi(row[i]);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:570:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    *(fp->Value.Value.Signed4) = atoi(row[i]);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:581:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    *(fp->Value.Value.Unsigned4) = atoi(row[i]);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:686:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:794:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:836:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*unique = atoi(row[0]);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:851:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(num, " %d ", i);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:913:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1225:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1233:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(up->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1237:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(up->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1241:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(up->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1245:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(up->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1249:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %f ", *(up->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1253:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %f ", *(up->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1277:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1284:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(foo, " %d ", *(fp->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1288:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(foo, " %d ", *(fp->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1292:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(foo, " %d ", *(fp->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1296:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(foo, " %d ", *(fp->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1300:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(foo, " %f ", *(fp->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1304:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(foo, " %f ", *(fp->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1354:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char foo[100],
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1358:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(cp->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1362:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(cp->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1366:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(cp->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1370:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(cp->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1374:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %f ", *(cp->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1378:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %f ", *(cp->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:203:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:243:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(server_name, "localhost");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:249:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    port_number = (unsigned int)atoi(port);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:563:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    *(fp->Value.Value.Signed2) = atoi(row[i]);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:574:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    *(fp->Value.Value.Unsigned2) = atoi(row[i]);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:585:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    *(fp->Value.Value.Signed4) = atoi(row[i]);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:596:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    *(fp->Value.Value.Unsigned4) = atoi(row[i]);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:701:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:812:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:857:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*unique = atoi(row[0]);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:872:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(num, " %d ", i);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:934:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1267:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1275:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(up->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1279:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(up->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1283:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(up->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1287:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(up->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1291:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %f ", *(up->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1295:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %f ", *(up->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1319:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1326:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(foo, " %d ", *(fp->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1330:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(foo, " %d ", *(fp->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1334:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(foo, " %d ", *(fp->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1338:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(foo, " %d ", *(fp->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1342:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(foo, " %f ", *(fp->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1346:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(foo, " %f ", *(fp->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1396:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char foo[100],
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1400:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(cp->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1404:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(cp->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1408:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(cp->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1412:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(cp->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1416:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %f ", *(cp->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1420:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %f ", *(cp->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:104:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " , ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:113:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp[512];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:116:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char quote[2];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:125:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(temp, "%u", *fp->Value.Value.Unsigned2);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:129:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(temp, "%u", *fp->Value.Value.Unsigned4);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:133:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(temp, "%d", *fp->Value.Value.Signed2);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:137:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(temp, "%d", *fp->Value.Value.Signed4);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:141:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(temp, "%f", *fp->Value.Value.Float4);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:145:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(temp, "%f", *fp->Value.Value.Float8);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:187:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " , ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:198:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char quote[2];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:206:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " = ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:209:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " like ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:212:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " <> ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:215:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " > ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:218:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " >= ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:221:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " < ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:224:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " <= ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:234:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char foo[100];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:238:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(foo, " %d ", *(cp->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:242:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(foo, " %d ", *(cp->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:246:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(foo, " %d ", *(cp->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:250:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(foo, " %d ", *(cp->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:254:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(foo, " %f ", *(cp->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:258:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(foo, " %f ", *(cp->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:291:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " AND ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:305:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(c, "%d", *(up->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:308:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(c, "%d", *(up->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:311:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(c, "%d", *(up->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:314:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(c, "%d", *(up->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:317:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(c, "%f", *(up->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:320:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(c, "%f", *(up->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:331:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(c, "\"FILLER-WILL BE REPLACED\"");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:334:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(c, "0xFFFFFFFF");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:338:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(c, " 0 ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:396:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(command, " , ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:399:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " = ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:420:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      *(fp->Value.Value.Signed2) = atoi(PQgetvalue(res, tuple, fieldNum));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:431:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      *(fp->Value.Value.Unsigned2) = atoi(PQgetvalue(res, tuple, fieldNum));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:442:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      *(fp->Value.Value.Signed4) = atoi(PQgetvalue(res, tuple, fieldNum));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:453:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      *(fp->Value.Value.Unsigned4) = atoi(PQgetvalue(res, tuple, fieldNum));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:605:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char server_name[50];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:692:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char server_name[50];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:886:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tabcol[100];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:893:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char selectCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:924:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(selectCommand, "SELECT ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:926:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(selectCommand, " FROM " );
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:930:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(selectCommand, " WHERE ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:979:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tabcol[100];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:985:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char selectCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1016:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(selectCommand, "SELECT ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1018:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(selectCommand, " FROM " );
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1022:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(selectCommand, " WHERE ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1101:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tabcol[100];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1108:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char updateCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1137:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(updateCommand, "UPDATE ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1139:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(updateCommand, " SET ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1143:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(updateCommand, " WHERE ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1169:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tabcol[100];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1176:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char updateCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1205:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(updateCommand, "UPDATE ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1207:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(updateCommand, " SET ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1211:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(updateCommand, " WHERE ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1264:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tabcol[100];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1271:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char selectCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1272:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char updateCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1327:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  *unique=atoi(PQgetvalue(res, 0, 0));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1360:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tabcol[100];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1367:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char selectCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1368:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char updateCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1413:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  *unique=atoi(PQgetvalue(res, 0, 0));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1461:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tabcol[100];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1468:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char insertCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1489:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(insertCommand, "INSERT INTO ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1493:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(insertCommand, ") VALUES (" );
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1495:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(insertCommand, ");" );
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1546:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tabcol[100];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1552:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char insertCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1572:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(insertCommand, "INSERT INTO ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1576:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(insertCommand, ") VALUES (" );
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1578:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(insertCommand, ");" );
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1644:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char deleteCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1672:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(deleteCommand, "DELETE FROM ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1676:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(deleteCommand, " WHERE ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1704:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char deleteCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1732:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(deleteCommand, "DELETE FROM ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1736:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(deleteCommand, " WHERE ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1808:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char descbuf[512];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1815:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char lcTable[512];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1830:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(descbuf, "SELECT a.attname, t.typname, a.attlen ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1831:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(descbuf, "FROM pg_class c, pg_attribute a, pg_type t ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1832:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(descbuf, "WHERE c.relname = '");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1835:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(descbuf, "   and a.attnum > 0 ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1836:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(descbuf, "   and a.attrelid = c.oid ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1837:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(descbuf, "   and a.atttypid = t.oid ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1849:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    field.Value.AllocatedSize = atoi(PQgetvalue(res, i, 2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp[512];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:130:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp[512];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:131:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char quote[2];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:179:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf(temp, "\' ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:194:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char temp[512];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:206:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(sqlStatement, " is null ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:209:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(sqlStatement, " is not null ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:212:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(sqlStatement, " = ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:215:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(sqlStatement, " like ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:218:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(sqlStatement, " != ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:221:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(sqlStatement, " > ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:224:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(sqlStatement, " >= ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:227:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(sqlStatement, " < ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:230:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(sqlStatement, " <= ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:241:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(temp, " %d ", *(cp->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:244:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(temp, " %d ", *(cp->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:247:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(temp, " %d ", *(cp->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:250:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(temp, " %d ", *(cp->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:253:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(temp, " %f ", *(cp->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:256:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(temp, " %f ", *(cp->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:470:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp[512];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:478:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%d", *(up->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:481:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%d", *(up->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:484:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%d", *(up->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:487:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%d", *(up->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:490:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%f", *(up->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:493:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%f", *(up->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:507:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(temp, " 0 ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:659:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szdsn[32],szuid[32],szpwd[20];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:668:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char accessScratch[1024];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:741:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char msg[512];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:742:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:743:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:832:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char szdsn[32],szuid[32],szpwd[20];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:841:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char accessScratch[1024];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:914:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[512];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:915:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:916:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sqlStatement[8192];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1186:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1187:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1201:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(sqlStatement, "SELECT ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1209:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char temp[512];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1215:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(sqlStatement, " WHERE ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1236:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1237:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1277:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1278:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1310:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sqlStatement[8192];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1353:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1354:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1368:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(sqlStatement, "SELECT ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1376:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char temp[512];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1382:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(sqlStatement, " WHERE ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1403:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1404:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1444:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1445:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1510:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sqlStatement[8192];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1557:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1558:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1602:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(sqlStatement, " WHERE ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1620:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1621:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1655:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sqlStatement[8192];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1701:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1702:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1746:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(sqlStatement, " WHERE ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1764:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1765:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1815:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s1[256];						\
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1816:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s2[256];						\
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1845:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sqlStatement[8192];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1906:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(sqlStatement, "BEGIN TRANSACTION UNIQUEUPDATE");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1949:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(sqlStatement, "COMMIT TRANSACTION UNIQUEUPDATE");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2020:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sqlStatement[8192];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2061:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2062:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2105:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(sqlStatement, " ) VALUES ( " );
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2115:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(sqlStatement, " )");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2123:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2124:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2154:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sqlStatement[8192];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2194:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2195:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2241:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(sqlStatement, " ) VALUES ( " );
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2251:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(sqlStatement, " )");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2259:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2260:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2287:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sqlStatement[8192];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2299:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(sqlStatement, "BEGIN TRANSACTION TBLINSERT");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2304:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2305:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2325:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sqlStatement[8192];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2336:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(sqlStatement, "COMMIT TRANSACTION TBLINSERT");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2341:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2342:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2363:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sqlStatement[8192];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2374:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(sqlStatement, "ROLLBACK TRANSACTION TBLINSERT");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2379:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2380:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2438:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sqlStatement[8192];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2482:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2483:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2505:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(sqlStatement, " WHERE ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2518:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2519:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2551:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sqlStatement[8192];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2594:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2595:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2617:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(sqlStatement, " WHERE ");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2630:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2631:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2706:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char column_name[SQL_MAX_COLUMN_NAME_LEN + 1];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2715:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sqlStatement[8192];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2738:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2739:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2760:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2761:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2786:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2787:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2804:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(sqlStatement, "SELECT name,type,length from syscolumns where id = %d",
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2810:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2811:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2837:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s1[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2838:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s2[256];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:205:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:241:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(server_name, "SYBASE");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:304:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char localDBName[1024];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:777:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:1083:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:1411:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_ufs.h:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[1024];
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_ufs.h:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fieldName[49];
data/ctn-3.2.0~dfsg/facilities/tbl/ufs.c:115:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tbl/ufs.c:258:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tbl/ufs.c:265:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    handle->file = fopen(fileName, "r");
data/ctn-3.2.0~dfsg/facilities/tbl/ufs.c:320:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:112:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char text[1024];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:133:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " , ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:142:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp[512];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:145:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char quote[2];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:154:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(temp, "%u", *fp->Value.Value.Unsigned2);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:158:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(temp, "%u", *fp->Value.Value.Unsigned4);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:162:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(temp, "%d", *fp->Value.Value.Signed2);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:166:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(temp, "%d", *fp->Value.Value.Signed4);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:170:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(temp, "%f", *fp->Value.Value.Float4);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:174:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(temp, "%f", *fp->Value.Value.Float8);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:220:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " , ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:231:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char quote[2];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:240:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " = ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:243:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " like ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:246:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " <> ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:249:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " > ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:252:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " >= ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:255:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " < ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:258:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " <= ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:268:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char foo[100];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:272:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(foo, " %d ", *(cp->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:276:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(foo, " %d ", *(cp->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:280:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(foo, " %d ", *(cp->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:284:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(foo, " %d ", *(cp->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:288:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(foo, " %f ", *(cp->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:292:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(foo, " %f ", *(cp->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:331:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " AND ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:345:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(c, "%d", *(up->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:348:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(c, "%d", *(up->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:351:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(c, "%d", *(up->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:354:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(c, "%d", *(up->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:357:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(c, "%f", *(up->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:360:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(c, "%f", *(up->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:371:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(c, "\"FILLER-WILL BE REPLACED\"");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:374:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(c, "0xFFFFFFFF");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:378:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(c, " 0 ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:436:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(command, " , ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:439:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(command, " = ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:460:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      *(fp->Value.Value.Signed2) = atoi(PQgetvalue(res, tuple, fieldNum));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:471:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      *(fp->Value.Value.Unsigned2) = atoi(PQgetvalue(res, tuple, fieldNum));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:482:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      *(fp->Value.Value.Signed4) = atoi(PQgetvalue(res, tuple, fieldNum));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:493:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      *(fp->Value.Value.Unsigned4) = atoi(PQgetvalue(res, tuple, fieldNum));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:652:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char server_name[50];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:803:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char server_name[50];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1026:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tabcol[100];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1033:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char selectCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1064:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(selectCommand, "SELECT ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1066:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(selectCommand, " FROM " );
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1070:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(selectCommand, " WHERE ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1180:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tabcol[100];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1186:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char selectCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1216:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(selectCommand, "SELECT ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1218:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(selectCommand, " FROM " );
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1222:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(selectCommand, " WHERE ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1302:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tabcol[100];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1309:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char updateCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1338:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(updateCommand, "UPDATE ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1340:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(updateCommand, " SET ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1344:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(updateCommand, " WHERE ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1372:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1485:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tabcol[100];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1491:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char updateCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1519:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(updateCommand, "UPDATE ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1521:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(updateCommand, " SET ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1525:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(updateCommand, " WHERE ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1553:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1661:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tabcol[100];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1668:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char selectCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1669:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char updateCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1724:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  *unique=atoi(PQgetvalue(res, 0, 0));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1753:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(selectCommand, "SELECT ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1755:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(selectCommand, " FROM " );
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1759:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(selectCommand, " WHERE ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1803:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1845:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*unique = atoi(row[0]);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1860:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(num, " %d ", i);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1913:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tabcol[100];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1920:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char insertCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1941:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(insertCommand, "INSERT INTO ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1945:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(insertCommand, ") VALUES (" );
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1947:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(insertCommand, ");" );
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2045:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tabcol[100];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2051:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char insertCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2071:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(insertCommand, "INSERT INTO ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2075:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(insertCommand, ") VALUES (" );
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2077:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(insertCommand, ");" );
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2189:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char deleteCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2217:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(deleteCommand, "DELETE FROM ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2221:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(deleteCommand, " WHERE ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2332:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char deleteCommand[2048];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2359:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(deleteCommand, "DELETE FROM ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2363:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(deleteCommand, " WHERE ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2490:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char descbuf[512];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2497:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char lcTable[512];
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2512:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(descbuf, "SELECT a.attname, t.typname, a.attlen ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2513:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(descbuf, "FROM pg_class c, pg_attribute a, pg_type t ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2514:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(descbuf, "WHERE c.relname = '");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2517:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(descbuf, "   and a.attnum > 0 ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2518:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(descbuf, "   and a.attrelid = c.oid ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2519:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(descbuf, "   and a.atttypid = t.oid ");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2531:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    field.Value.AllocatedSize = atoi(PQgetvalue(res, i, 2));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2594:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2602:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(up->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2606:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(up->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2610:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(up->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2614:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(up->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2618:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %f ", *(up->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2622:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %f ", *(up->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2646:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2653:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(foo, " %d ", *(fp->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2657:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(foo, " %d ", *(fp->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2661:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(foo, " %d ", *(fp->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2665:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(foo, " %d ", *(fp->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2669:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(foo, " %f ", *(fp->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2673:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(foo, " %f ", *(fp->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2723:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char foo[100],
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2727:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(cp->Value.Value.Signed2));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2731:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(cp->Value.Value.Unsigned2));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2735:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(cp->Value.Value.Signed4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2739:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %d ", *(cp->Value.Value.Unsigned4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2743:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %f ", *(cp->Value.Value.Float4));
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2747:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(foo, " %f ", *(cp->Value.Value.Float8));
data/ctn-3.2.0~dfsg/facilities/thread/ctnthread.c:79:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(name, "CTN-MUTEX-%d", i);
data/ctn-3.2.0~dfsg/facilities/thread/ctnthread.c:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[32];
data/ctn-3.2.0~dfsg/facilities/thread/ctnthread.c:165:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/ctn-3.2.0~dfsg/facilities/uid/dicom_uids.h:223:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char root[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/uid/dicom_uids.h:237:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char UID[DICOM_UI_LENGTH + 1];
data/ctn-3.2.0~dfsg/facilities/uid/dicom_uids.h:238:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char description[64];
data/ctn-3.2.0~dfsg/facilities/uid/dicom_uids.h:239:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char originator[32];
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:72:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:451:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(description->description, "UID Not Found");
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:452:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(description->originator, "NONE");
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:507:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:532:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(uidFile, "r");
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:617:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(uidFile, "w");
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:97:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errorBuff[256];
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:283:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:295:14:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return ((atol(year) * 10000) + (atol(month) * 100) + atol(day));
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:295:37:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return ((atol(year) * 10000) + (atol(month) * 100) + atol(day));
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:295:58:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return ((atol(year) * 10000) + (atol(month) * 100) + atol(day));
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:316:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(date, "%04d%02d%02d", year, month, day);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:330:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:424:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(time, "%02d%02d%02d.%06d", hour, minute, second, fracsec);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:571:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(datestr, "%04d%02d%02d", (tf->tm_year) + 1900, (tf->tm_mon) + 1, tf->tm_mday);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:591:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(timestr, "%02d%02d%02d.%06d", (tf->tm_hour), (tf->tm_min), (tf->tm_sec), 0);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:597:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char key[10];
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:602:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char key[10];
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:616:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(t->key, "UTL STAMP");
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:690:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:812:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char directoryText[1024];
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:815:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(directoryText, "/*");
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:861:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:876:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f = fopen(UTL_configFile, "r");
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:921:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(UTL_configFile, "/runtime/ctn_cfg.txt");
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:937:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nameCopy[256];
data/ctn-3.2.0~dfsg/facilities/utility/utility.h:71:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[1024];
data/ctn-3.2.0~dfsg/facilities/xutl/xutl.c:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[1024];
data/ctn-3.2.0~dfsg/facilities/xutl/xutl.c:67:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f = fopen(s->runtime, "r");
data/ctn-3.2.0~dfsg/facilities/xutl/xutl.c:125:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fontName[1024];
data/ctn-3.2.0~dfsg/facilities/xutl/xutl.h:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		runtime[1024];  /* Runtime directory */
data/ctn-3.2.0~dfsg/facilities/xutl/xutl.h:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char charset[1024];
data/ctn-3.2.0~dfsg/facilities/xutl/xutl.h:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fontname[1024];
data/ctn-3.2.0~dfsg/facilities/xutl/xutl_mb.c:173:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char subString[1024];
data/ctn-3.2.0~dfsg/facilities/xutl/xutl_mb.c:224:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mbChar[5];
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char codeValue[DICOM_CS_LENGTH+1] = "";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char codingSchemeDesig[DICOM_SH_LENGTH+1] = "";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:43:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char codingSchemeVersion[DICOM_SH_LENGTH+1] = "";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char codeMeaning[DICOM_LO_LENGTH+1] = "";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mappingResource[DICOM_CS_LENGTH+1] = "";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char contextGroupVersion[DICOM_DT_LENGTH+1] = "";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char contextIdentifier[DICOM_CS_LENGTH+1] = "";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:174:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(s, "No VR");
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:228:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[512];
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:292:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[512];
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:348:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[256] = "0";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:374:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[128] = "<none>";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:419:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[128] = "<none>";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:435:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(s, "<Sequence>");
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:469:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[128];
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:766:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[128] = "XX";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:798:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(e.description, "No description");
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:1172:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char patientName[DICOM_PN_LENGTH+1] = "";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:1173:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char patientID[DICOM_LO_LENGTH+1] = "";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:1174:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char birthDate[DICOM_DA_LENGTH+1] = "";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:1175:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sex[DICOM_CS_LENGTH + 1] = "";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:1241:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char windowCenter[DICOM_DS_LENGTH+1] = "0";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:1242:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char windowWidth[DICOM_DS_LENGTH+1] = "0";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:1243:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rescaleSlope[DICOM_DS_LENGTH+1] = "1";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:1244:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rescaleIntercept[DICOM_DS_LENGTH + 1] = "0";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:1245:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char numberOfFrames[DICOM_IS_LENGTH + 1] = "1";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:1249:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char photometricInterpretation[DICOM_CS_LENGTH+1] = "";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:1298:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  frameCount = atoi(numberOfFrames);
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:2460:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pixels, p, pixelCount);
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:2747:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char samplingFrequencyTxt[DICOM_DS_LENGTH*2 + 2] = "";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:2748:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char groupLabel[DICOM_SH_LENGTH + 1] = "";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:2750:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char waveformSampleValueRepresentation[DICOM_CS_LENGTH+1];
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:2861:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char channelStatus[DICOM_CS_LENGTH + 1] = "";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:2862:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char channelLabel[DICOM_SH_LENGTH + 1] = "";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:2863:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char channelNumberTxt[DICOM_IS_LENGTH + 1] = "-1";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:2864:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char channelSensitivityTxt[DICOM_DS_LENGTH + 1] = "";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:2865:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char channelSensitivityCorrectionFactorTxt[DICOM_DS_LENGTH + 1] = "";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:2866:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char channelBaselineTxt[DICOM_DS_LENGTH + 1] = "";
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:2986:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    channelNumber = atoi(channelNumberTxt);
data/ctn-3.2.0~dfsg/testapps/ramp/ramp8.c:5:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char v[256];
data/ctn-3.2.0~dfsg/apps/apps_include/UxXt.h:74:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	XtVaTypedArg, (res_name), XmRString, (res_value), strlen(res_value) + 1
data/ctn-3.2.0~dfsg/apps/assoc_tool/UxMethod.c:230:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Names[NumNames] = (char *) UxMalloc(strlen(name) + 1);
data/ctn-3.2.0~dfsg/apps/assoc_tool/UxXt.c:589:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    from.size = strlen(fontlist_str) + 1;
data/ctn-3.2.0~dfsg/apps/assoc_tool/UxXt.c:631:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    maxlen = strlen(value_str) + 1;
data/ctn-3.2.0~dfsg/apps/assoc_tool/UxXt.c:675:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fg_from.size = strlen(XtDefaultForeground);
data/ctn-3.2.0~dfsg/apps/assoc_tool/UxXt.c:678:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bg_from.size = strlen(XtDefaultBackground);
data/ctn-3.2.0~dfsg/apps/assoc_tool/UxXt.h:74:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	XtVaTypedArg, (res_name), XmRString, (res_value), strlen(res_value) + 1
data/ctn-3.2.0~dfsg/apps/assoc_tool/load_sopClasses.c:213:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(se->tSyntaxes[1], "\0");
data/ctn-3.2.0~dfsg/apps/assoc_tool/load_sopClasses.c:214:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(se->tSyntaxes[2], "\0");
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:186:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(params.calledPresentationAddress, ":");
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:262:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(info, "\n");
data/ctn-3.2.0~dfsg/apps/assoc_tool/netWork.c:435:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(info, "\n");
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:453:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(se->tSyntaxes[0]) != 0) {
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:459:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(se->tSyntaxes[1]) != 0) {
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:465:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(se->tSyntaxes[2]) != 0) {
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:500:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(buf_mes, "");
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:508:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	    strcpy(buf_mes, "");
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:619:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(buf_mes, "");
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:624:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	    strcpy(buf_mes, "");
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:629:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	    strcpy(buf_mes, "");
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:671:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(buf_mes, "");
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:676:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	    strcpy(buf_mes, "");
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:681:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	    strcpy(buf_mes, "");
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:689:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(buf_mes, "");
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:738:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(text_typed) != 0) {
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:746:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(text_typed) != 0) {
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:754:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(text_typed) != 0) {
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:762:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(text_typed) != 0) {
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:769:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(buffer) != 0) {
data/ctn-3.2.0~dfsg/apps/assoc_tool/topLevelShell1.c:834:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(XmTextGetString(textField1)) != 0) {
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/UxMethod.c:230:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Names[NumNames] = (char *) UxMalloc(strlen(name) + 1);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/UxXt.c:589:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    from.size = strlen(fontlist_str) + 1;
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/UxXt.c:631:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    maxlen = strlen(value_str) + 1;
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/UxXt.c:675:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fg_from.size = strlen(XtDefaultForeground);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/UxXt.c:678:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bg_from.size = strlen(XtDefaultBackground);
data/ctn-3.2.0~dfsg/apps/cfg_ctn_tables/UxXt.h:74:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	XtVaTypedArg, (res_name), XmRString, (res_value), strlen(res_value) + 1
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:397:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(patientID) != 0) {
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:401:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(studyInstanceUID) != 0) {
data/ctn-3.2.0~dfsg/apps/clone_study/clone_study.c:405:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(accessionNumber) != 0) {
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:56:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    map->orig = malloc(strlen(orig) + 1);
data/ctn-3.2.0~dfsg/apps/clone_study/remap.c:57:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    map->mapped = malloc(strlen(mapped) + 1);
data/ctn-3.2.0~dfsg/apps/ctn_cutil/ctn_cutil.c:131:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    x1Length = strlen(x1);
data/ctn-3.2.0~dfsg/apps/ctn_validate_mb/ctn_validate_mb.c:309:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      cond = CHR_ValidateEncoding(s, strlen(s),
data/ctn-3.2.0~dfsg/apps/ctn_validate_mb/ctn_validate_mb.c:359:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      cond = CHR_Encode(s, strlen(s), CHR_ISO2022JP,
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork.c:293:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	(void) usleep(SLEEP_TIME);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:182:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	XTextExtents(fontLG, temp, strlen(temp), &dir, &fa, &fd, &or);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:187:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    ((bar_height - h) / 2) + h, temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:226:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	XTextExtents(fontLG, temp, strlen(temp), &dir, &fa, &fd, &or);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:232:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:291:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	XTextExtents(fontLG, temp, strlen(temp), &dir, &fa, &fd, &or);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:297:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:329:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	XTextExtents(fontLG, temp, strlen(temp), &dir, &fa, &fd, &or);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:335:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:373:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		XTextExtents(fontLG, temp, strlen(temp), &dir, &fa, &fd, &or);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:379:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:387:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		XTextExtents(fontLG, temp, strlen(temp), &dir, &fa, &fd, &or);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:392:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    ((bar_height - h) / 2) + h, temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:400:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		XTextExtents(fontLG, temp, strlen(temp), &dir, &fa, &fd, &or);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:405:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    ((bar_height - h) / 2) + h, temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:413:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		XTextExtents(fontLG, temp, strlen(temp), &dir, &fa, &fd, &or);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:418:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    ((bar_height - h) / 2) + h, temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:435:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		XTextExtents(fontLG, temp, strlen(temp), &dir, &fa, &fd, &or);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:440:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    ((bar_height - h) / 2) + h, temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:458:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		XTextExtents(fontLG, temp, strlen(temp), &dir, &fa, &fd, &or);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:463:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    ((bar_height - h) / 2) + h, temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:473:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    XTextExtents(fontLG, temp, strlen(temp), &dir, &fa, &fd, &or);
data/ctn-3.2.0~dfsg/apps/ctnnetwork/ctnnetwork_x_support.c:478:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			((bar_height - h) / 2) + h, temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c:115:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(spec.Patient.Name, "*");
data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c:116:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(spec.Patient.PatID, "");
data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c:117:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(spec.Patient.BirthDate, "");
data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c:119:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(spec.Study.StudyDate, "");
data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c:120:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(spec.Study.StudyTime, "");
data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c:121:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(spec.Study.StudyID, "");
data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c:122:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(spec.Study.AccessionNumber, "");
data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c:123:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(spec.Study.StudyUID, "");
data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c:124:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(spec.Study.ReferringPhysName, "");
data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c:125:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(spec.Study.InterpretingPhysName, "");
data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c:126:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(spec.Study.ProcedureDescription, "");
data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c:129:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(spec.Series.Modality, "");
data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c:130:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(spec.Series.SeriesNumber, "");
data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c:131:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(spec.Series.SeriesUID, "");
data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c:133:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(spec.Image.ImageNumber, "");
data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c:134:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(spec.Image.ImageUID, "");
data/ctn-3.2.0~dfsg/apps/database/dbquerytest.c:135:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(spec.Image.ClassUID, "");
data/ctn-3.2.0~dfsg/apps/dbfill/dbfill.c:120:6:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	    strcat(current_dir, "/");
data/ctn-3.2.0~dfsg/apps/dbfill/dbfill.c:395:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p = buf + strlen(buf);
data/ctn-3.2.0~dfsg/apps/dcm_add_fragments/dcm_add_fragments.c:179:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    bytesRead = read(fd, buffer, fileSize);
data/ctn-3.2.0~dfsg/apps/dcm_create_object/dcm_create_object.c:298:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    e->length = strlen(data);
data/ctn-3.2.0~dfsg/apps/dcm_create_object/dcm_create_object.c:414:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read(fd, p, size) != size) {
data/ctn-3.2.0~dfsg/apps/dcm_create_object/dcm_create_object.c:471:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (read(fd, p, size) != size) {
data/ctn-3.2.0~dfsg/apps/dcm_create_object/dcm_create_object.c:532:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (read(fd, p, size) != size) {
data/ctn-3.2.0~dfsg/apps/dcm_create_object/lex_mod.c:510:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			     (c = getc( yyin )) != EOF && c != '\n'; ++n ) \
data/ctn-3.2.0~dfsg/apps/dcm_diff/dcm_diff.c:79:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(temp1, e1->d.string, l);
data/ctn-3.2.0~dfsg/apps/dcm_diff/dcm_diff.c:83:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(temp2, e2->d.string, l);
data/ctn-3.2.0~dfsg/apps/dcm_diff/dcm_diff.c:109:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   strlen(c1), c1, strlen(c2), c2);
data/ctn-3.2.0~dfsg/apps/dcm_diff/dcm_diff.c:109:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   strlen(c1), c1, strlen(c2), c2);
data/ctn-3.2.0~dfsg/apps/dcm_dump_file/dcm_dump_file.c:90:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(p2, "/");
data/ctn-3.2.0~dfsg/apps/dcm_iterator/dcm_iterator.c:91:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(p2, "/");
data/ctn-3.2.0~dfsg/apps/dcm_iterator/dcm_iterator.c:113:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(txt, e->d.string, l);
data/ctn-3.2.0~dfsg/apps/dcm_make_object/dcm_make_object.c:272:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    e.length = strlen(data);
data/ctn-3.2.0~dfsg/apps/dcm_make_object/dcm_make_object.c:392:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read(fd, p, size) != size) {
data/ctn-3.2.0~dfsg/apps/dcm_modify_elements/dcm_modify_elements.c:302:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    e.length = strlen(data);
data/ctn-3.2.0~dfsg/apps/dcm_modify_elements/dcm_modify_elements.c:424:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read(fd, p, size) != size) {
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/dcm_modify_object.c:345:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    e->length = strlen(data);
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/dcm_modify_object.c:444:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      bytesRead = read(fd, p, remainingBytes);
data/ctn-3.2.0~dfsg/apps/dcm_modify_object/lex_mod.c:509:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			     (c = getc( yyin )) != EOF && c != '\n'; ++n ) \
data/ctn-3.2.0~dfsg/apps/dcm_replace_element/dcm_replace_element.c:111:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  bytesRead = read(fd, p, l);
data/ctn-3.2.0~dfsg/apps/dcm_to_html/dcm_to_html.c:358:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(txt, e->d.string, stringLength);
data/ctn-3.2.0~dfsg/apps/dcm_to_text/dcm_to_text.c:98:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(txt, e->d.string, l);
data/ctn-3.2.0~dfsg/apps/dcm_to_text/dcm_to_text.c:102:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		l = strlen(txt);
data/ctn-3.2.0~dfsg/apps/dcm_to_text/dcm_to_text.c:112:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
			strcat(line, "\"");
data/ctn-3.2.0~dfsg/apps/dcm_to_text/dcm_to_text.c:131:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(line, "\t");
data/ctn-3.2.0~dfsg/apps/dcm_to_xml/dcm_to_xml.c:95:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(txt, e->d.string, l);
data/ctn-3.2.0~dfsg/apps/dcm_to_xml/dcm_to_xml.c:114:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(tag, ">");
data/ctn-3.2.0~dfsg/apps/dcm_to_xml/dcm_to_xml.c:147:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(tag, ">");
data/ctn-3.2.0~dfsg/apps/dcm_vr_patterns/dcm_vr_patterns.c:83:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  e.length = strlen(txt);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp.c:348:13:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	    (void) usleep(100000);
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:364:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	w = XTextWidth(fontSM, img->error_message, strlen(img->error_message));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:367:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    img->error_message, strlen(img->error_message));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:400:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	w = XTextWidth(fontSM, patient_string, strlen(patient_string));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:403:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    patient_string, strlen(patient_string));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:537:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	w = XTextWidth(fontSM, img->error_message, strlen(img->error_message));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:540:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    img->error_message, strlen(img->error_message));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:593:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    w = XTextWidth(fontSM, patient_string, strlen(patient_string));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:596:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		patient_string, strlen(patient_string));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:658:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(temp, ":");
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:660:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    w = XTextWidth(fontLG, temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:663:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:666:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    w = XTextWidth(fontSM, temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:670:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:673:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    w = XTextWidth(fontSM, temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:677:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:713:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(temp, ":");
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:715:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    w = XTextWidth(fontLG, temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:718:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:721:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    w = XTextWidth(fontSM, temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:725:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:728:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    w = XTextWidth(fontSM, temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:732:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:775:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	w = XTextWidth(fontLG, temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:778:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:825:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	w = XTextWidth(fontLG, temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/displays/ctndisp_x_support.c:828:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    temp, strlen(temp));
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:174:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(imageCharSet, "");
data/ctn-3.2.0~dfsg/apps/displays/image_utils.c:259:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  bytesRead = read(fd, *ptr, *fileSize);
data/ctn-3.2.0~dfsg/apps/fillRSA/work.c:602:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(dst);
data/ctn-3.2.0~dfsg/apps/fillRSA/workImpInterp.c:138:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(results.Imp) + strlen(line) <= sizeof(results.Imp) - 1)
data/ctn-3.2.0~dfsg/apps/fillRSA/workImpInterp.c:138:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(results.Imp) + strlen(line) <= sizeof(results.Imp) - 1)
data/ctn-3.2.0~dfsg/apps/fillRSA/workImpInterp.c:142:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    results.Imp[strlen(results.Imp) - 1] = '\0';
data/ctn-3.2.0~dfsg/apps/fillRSA/workImpInterp.c:162:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(interpretation.IntTex) + strlen(line) <=
data/ctn-3.2.0~dfsg/apps/fillRSA/workImpInterp.c:162:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(interpretation.IntTex) + strlen(line) <=
data/ctn-3.2.0~dfsg/apps/fillRSA/workImpInterp.c:167:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    printf("%d\n", strlen(interpretation.IntTex));
data/ctn-3.2.0~dfsg/apps/fis_server/association.c:350:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(params->callingImplementationClassUID) == 0) {
data/ctn-3.2.0~dfsg/apps/icon/create_db_entry.c:95:12:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    (void) strcpy(cwd, "\0");	/* initialize current working directory */
data/ctn-3.2.0~dfsg/apps/icon/create_print_entry.c:137:12:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    (void) strcpy(cwd, "\0");	/* initialize current working directory */
data/ctn-3.2.0~dfsg/apps/icon/icon_append_file.c:353:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(src) + 1;
data/ctn-3.2.0~dfsg/apps/icon/icon_append_index.c:295:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(src) + 1;
data/ctn-3.2.0~dfsg/apps/idb_viewer/UxMethod.c:230:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Names[NumNames] = (char *) UxMalloc(strlen(name) + 1);
data/ctn-3.2.0~dfsg/apps/idb_viewer/UxXt.c:589:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    from.size = strlen(fontlist_str) + 1;
data/ctn-3.2.0~dfsg/apps/idb_viewer/UxXt.c:631:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    maxlen = strlen(value_str) + 1;
data/ctn-3.2.0~dfsg/apps/idb_viewer/UxXt.c:675:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fg_from.size = strlen(XtDefaultForeground);
data/ctn-3.2.0~dfsg/apps/idb_viewer/UxXt.c:678:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bg_from.size = strlen(XtDefaultBackground);
data/ctn-3.2.0~dfsg/apps/idb_viewer/UxXt.h:74:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	XtVaTypedArg, (res_name), XmRString, (res_value), strlen(res_value) + 1
data/ctn-3.2.0~dfsg/apps/image_archive/association.c:480:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(params->callingImplementationClassUID) == 0) {
data/ctn-3.2.0~dfsg/apps/image_archive/association.c:615:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(genericAE) != 0)
data/ctn-3.2.0~dfsg/apps/image_archive/association_dummy.c:436:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(params->callingImplementationClassUID) == 0) {
data/ctn-3.2.0~dfsg/apps/image_archive/association_dummy.c:571:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(genericAE) != 0)
data/ctn-3.2.0~dfsg/apps/image_archive/commit_result.c:400:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	e.length = strlen(transactionUID);
data/ctn-3.2.0~dfsg/apps/image_archive/commit_result.c:411:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	e.length = strlen(retrieveAETitle);
data/ctn-3.2.0~dfsg/apps/image_archive/commit_result.c:571:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(localHost, "");
data/ctn-3.2.0~dfsg/apps/image_archive/copy.c:283:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    fields[i].Value.Size = strlen(fields[i].Value.Value.String);
data/ctn-3.2.0~dfsg/apps/image_archive/find.c:351:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	titleElement.length = strlen(titleElement.d.string);
data/ctn-3.2.0~dfsg/apps/image_archive/parse.c:323:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(insertStructure->patient.PatNam) == 0) {
data/ctn-3.2.0~dfsg/apps/image_archive/parse.c:328:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(insertStructure->patient.PatID) == 0) {
data/ctn-3.2.0~dfsg/apps/image_archive/parse.c:334:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(insertStructure->study.StuInsUID) == 0) {
data/ctn-3.2.0~dfsg/apps/image_archive/parse.c:339:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(insertStructure->series.SerInsUID) == 0) {
data/ctn-3.2.0~dfsg/apps/image_archive/parse.c:344:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(insertStructure->image.SOPInsUID) == 0) {
data/ctn-3.2.0~dfsg/apps/image_archive/parseMB.c:314:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(insertStructure->patient.PatNam) == 0) {
data/ctn-3.2.0~dfsg/apps/image_archive/parseMB.c:319:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(insertStructure->patient.PatID) == 0) {
data/ctn-3.2.0~dfsg/apps/image_archive/parseMB.c:325:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(insertStructure->study.StuInsUID) == 0) {
data/ctn-3.2.0~dfsg/apps/image_archive/parseMB.c:330:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(insertStructure->series.SerInsUID) == 0) {
data/ctn-3.2.0~dfsg/apps/image_archive/parseMB.c:335:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(insertStructure->image.SOPInsUID) == 0) {
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:791:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(imageCharSet, "");
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:887:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(Insertion.study.AccNum) != 0)
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:943:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(Insertion.patient.PatNam) == 0) {
data/ctn-3.2.0~dfsg/apps/image_archive/requests.c:948:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(Insertion.patient.PatID) == 0) {
data/ctn-3.2.0~dfsg/apps/image_archive/requests_dummy.c:591:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(Insertion.study.AccNum) != 0)
data/ctn-3.2.0~dfsg/apps/image_archive/requests_dummy.c:609:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(Insertion.patient.PatNam) == 0) {
data/ctn-3.2.0~dfsg/apps/image_archive/requests_dummy.c:614:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(Insertion.patient.PatID) == 0) {
data/ctn-3.2.0~dfsg/apps/image_server/association.c:424:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(params->callingImplementationClassUID) == 0) {
data/ctn-3.2.0~dfsg/apps/image_server/copy.c:279:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    fields[i].Value.Size = strlen(fields[i].Value.Value.String);
data/ctn-3.2.0~dfsg/apps/image_server/find.c:295:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	titleElement.length = strlen(titleElement.d.string);
data/ctn-3.2.0~dfsg/apps/image_server/parse.c:243:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(insertStructure->patient.PatNam) == 0) {
data/ctn-3.2.0~dfsg/apps/image_server/parse.c:248:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(insertStructure->patient.PatID) == 0) {
data/ctn-3.2.0~dfsg/apps/image_server/parse.c:253:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(insertStructure->study.StuInsUID) == 0) {
data/ctn-3.2.0~dfsg/apps/image_server/parse.c:258:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(insertStructure->series.SerInsUID) == 0) {
data/ctn-3.2.0~dfsg/apps/image_server/parse.c:263:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(insertStructure->image.SOPInsUID) == 0) {
data/ctn-3.2.0~dfsg/apps/image_server/requests.c:543:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(Insertion.study.AccNum) != 0)
data/ctn-3.2.0~dfsg/apps/load_control/load_control.c:131:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strncmp(token, map[i].tableName, strlen(token)) == 0)
data/ctn-3.2.0~dfsg/apps/mb_query/mb_query.c:133:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  e.length = strlen(s);
data/ctn-3.2.0~dfsg/apps/mb_query/mb_query.c:181:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    e.length = strlen(textValue);
data/ctn-3.2.0~dfsg/apps/mwlQuery/mwlQuery.c:133:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    e.length = strlen(textValue);
data/ctn-3.2.0~dfsg/apps/new_uids/new_uids.c:192:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    e.length = strlen(data);
data/ctn-3.2.0~dfsg/apps/object_viewer/UxMethod.c:230:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Names[NumNames] = (char *) UxMalloc(strlen(name) + 1);
data/ctn-3.2.0~dfsg/apps/object_viewer/UxXt.c:589:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    from.size = strlen(fontlist_str) + 1;
data/ctn-3.2.0~dfsg/apps/object_viewer/UxXt.c:631:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    maxlen = strlen(value_str) + 1;
data/ctn-3.2.0~dfsg/apps/object_viewer/UxXt.c:675:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fg_from.size = strlen(XtDefaultForeground);
data/ctn-3.2.0~dfsg/apps/object_viewer/UxXt.c:678:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bg_from.size = strlen(XtDefaultBackground);
data/ctn-3.2.0~dfsg/apps/object_viewer/UxXt.h:74:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	XtVaTypedArg, (res_name), XmRString, (res_value), strlen(res_value) + 1
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:256:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(XmTextGetString(text1)) != 0)
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:258:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(XmTextGetString(text2)) != 0)
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:261:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(XmTextGetString(scrolledText1)) != 0)
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:359:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(info, "\n");
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:520:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(XmTextGetString(text1)) != 0)
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:522:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(XmTextGetString(text2)) != 0)
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:601:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(XmTextGetString(text1)) != 0)
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:603:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(XmTextGetString(text2)) != 0)
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:688:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(XmTextGetString(text1)) != 0)
data/ctn-3.2.0~dfsg/apps/object_viewer/topLevelShell1.c:690:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(XmTextGetString(text2)) != 0)
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex3_acceptor.c:501:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while (strlen(*classArray) != 0) {
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex3_acceptor.c:525:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(params->callingImplementationClassUID) == 0) {
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex4_acceptor.c:570:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while (strlen(*classArray) != 0) {
data/ctn-3.2.0~dfsg/apps/pdu_examples/ex4_acceptor.c:594:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(params->callingImplementationClassUID) == 0) {
data/ctn-3.2.0~dfsg/apps/pmgr_motif/UxMethod.c:230:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Names[NumNames] = (char *) UxMalloc(strlen(name) + 1);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/UxXt.c:589:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    from.size = strlen(fontlist_str) + 1;
data/ctn-3.2.0~dfsg/apps/pmgr_motif/UxXt.c:631:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    maxlen = strlen(value_str) + 1;
data/ctn-3.2.0~dfsg/apps/pmgr_motif/UxXt.c:675:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fg_from.size = strlen(XtDefaultForeground);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/UxXt.c:678:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bg_from.size = strlen(XtDefaultBackground);
data/ctn-3.2.0~dfsg/apps/pmgr_motif/UxXt.h:74:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	XtVaTypedArg, (res_name), XmRString, (res_value), strlen(res_value) + 1
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:252:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(fb->trim, "");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmBoxForm.c:722:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	    strcpy(filmBox.filmBoxSOPInstanceUID, "");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:163:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(f->copies, "1");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:165:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(f->copies, "2");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/filmSessionForm.c:357:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(filmSession.filmSessionSOPInstanceUID, "");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:784:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(icons[idx / 8][idx % 8].UID, "");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:930:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(bib[i][j].UID, "");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:951:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(bib[i][j].UID, "");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/icon.c:1100:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(bib[i][j].UID) > 0) {
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:153:12:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    (void) strcpy(params->respondingAPTitle, "");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:168:12:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    (void) strcpy(params->calledImplementationClassUID, "");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:169:12:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    (void) strcpy(params->calledImplementationVersionName, "");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:226:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while (strlen(*SOPClassList) > 0) {
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:317:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while ((index < strlen(displayFormat))
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:344:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(string, "\0");
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:348:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while (index < strlen(displayFormat)) {
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:350:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while ((index < strlen(displayFormat))
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:826:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(request.instanceUID, "\0");	/* Let SCP provide it */
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:913:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(createResponse->instanceUID) == 0) {
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1006:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(request.instanceUID, "\0");	/* Let SCP provide it */
data/ctn-3.2.0~dfsg/apps/pmgr_motif/print_shared.c:1130:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(createResponse->instanceUID) == 0) {
data/ctn-3.2.0~dfsg/apps/print_clients/Fields.c:178:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!strncmp(data, frbtn->storage, strlen(data))) {
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:161:12:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    (void) strcpy(params->respondingAPTitle, "");
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:176:12:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    (void) strcpy(params->calledImplementationClassUID, "");
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:177:12:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    (void) strcpy(params->calledImplementationVersionName, "");
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:465:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while ((index < strlen(displayFormat))
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:492:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(string, "\0");
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:496:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while (index < strlen(displayFormat)) {
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:498:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while ((index < strlen(displayFormat))
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:835:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(request.instanceUID, "\0");	/* Let SCP provide it */
data/ctn-3.2.0~dfsg/apps/print_clients/client_support.c:984:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(request.instanceUID, "\0");	/* Let SCP provide it */
data/ctn-3.2.0~dfsg/apps/print_clients/display_error.c:215:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(error);
data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.c:699:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(icons[idx / 8][idx % 8].UID, "");
data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.c:955:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(bib[i][j].UID) > 0)
data/ctn-3.2.0~dfsg/apps/print_clients/display_icon.c:1096:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(bib[i][j].UID, "");
data/ctn-3.2.0~dfsg/apps/print_clients/display_message.c:165:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(string);
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:163:12:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    (void) strcpy(format, "\0");
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:434:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(format) != 0)
data/ctn-3.2.0~dfsg/apps/print_clients/print_client.c:451:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while (strlen(*SOPClassArray) > 0) {
data/ctn-3.2.0~dfsg/apps/print_clients/print_client_private.c:214:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(format) != 0)	/* user supplied FORMAT as command line
data/ctn-3.2.0~dfsg/apps/print_clients/print_mgr.c:502:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(bfsAttrib.filmSessionSOPInstanceUID, "");
data/ctn-3.2.0~dfsg/apps/print_clients/print_query.c:145:12:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    (void) strcpy(format, "\0");
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:163:12:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    (void) strcpy(params->respondingAPTitle, "");
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:178:12:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    (void) strcpy(params->calledImplementationClassUID, "");
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:179:12:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    (void) strcpy(params->calledImplementationVersionName, "");
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:236:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while (strlen(*SOPClassList) > 0) {
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:327:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while ((index < strlen(displayFormat))
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:354:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(string, "\0");
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:358:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while (index < strlen(displayFormat)) {
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:360:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while ((index < strlen(displayFormat))
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:838:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(request.instanceUID, "\0");	/* Let SCP provide it */
data/ctn-3.2.0~dfsg/apps/print_clients/print_shared.c:1055:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(request.instanceUID, "\0");	/* Let SCP provide it */
data/ctn-3.2.0~dfsg/apps/print_server/action.c:266:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	(void) strcpy(gqElement.objFile, "\0");
data/ctn-3.2.0~dfsg/apps/print_server/association.c:404:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(params->callingImplementationClassUID) == 0) {
data/ctn-3.2.0~dfsg/apps/print_server/delete.c:170:13:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	    (void) strcpy(gqElement.objFile, "\0");
data/ctn-3.2.0~dfsg/apps/print_server/passociation.c:404:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(params->callingImplementationClassUID) == 0) {
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:114:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while ((index < strlen(displayFormat))
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:141:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(string, "\0");
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:145:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while (index < strlen(displayFormat)) {
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:147:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while ((index < strlen(displayFormat))
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:285:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(fileName, "\0");
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:333:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	(void) strcpy(bfsInstance.bfsInstanceUID, "\0");
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:436:12:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    (void) strcpy((*bfbNode)->bfbInstanceUID, "\0");
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:453:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	(void) strcpy(bibNode->bibInstanceUID, "\0");
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:474:13:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	    (void) strcpy(babNode->babInstanceUID, "\0");
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:553:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(bfbNode->bfbInstanceUID) == 0) {
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:631:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if (strlen(elem.objFile) != 0)	/* file exists */
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:672:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	orgLen = strlen(*flagName);
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:676:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(*flagName, ",");
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:680:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    orgLen = strlen(*flagName);
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:681:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    newLen = orgLen + strlen(args[argno - 1]) + 1;
data/ctn-3.2.0~dfsg/apps/print_server/utils.c:685:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    newLen = orgLen + strlen(args[argno - 1]) + 1;
data/ctn-3.2.0~dfsg/apps/print_server_display/display_prn.c:560:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp("STANDARD", bfb->imageDisplayFormat, strlen("STANDARD")) != 0) {
data/ctn-3.2.0~dfsg/apps/print_server_display/print_server_display.c:87:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if (strlen(elem.objFile) != 0)	/* file exists */
data/ctn-3.2.0~dfsg/apps/print_server_display/print_server_display.c:242:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	temp = (char *) malloc(sizeof(char) * strlen(element.instanceUID) +1);
data/ctn-3.2.0~dfsg/apps/query_client/UxMethod.c:230:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Names[NumNames] = (char *) UxMalloc(strlen(name) + 1);
data/ctn-3.2.0~dfsg/apps/query_client/UxXt.c:589:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    from.size = strlen(fontlist_str) + 1;
data/ctn-3.2.0~dfsg/apps/query_client/UxXt.c:631:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    maxlen = strlen(value_str) + 1;
data/ctn-3.2.0~dfsg/apps/query_client/UxXt.c:675:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fg_from.size = strlen(XtDefaultForeground);
data/ctn-3.2.0~dfsg/apps/query_client/UxXt.c:678:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bg_from.size = strlen(XtDefaultBackground);
data/ctn-3.2.0~dfsg/apps/query_client/UxXt.h:74:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	XtVaTypedArg, (res_name), XmRString, (res_value), strlen(res_value) + 1
data/ctn-3.2.0~dfsg/apps/query_client/format.c:30:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(study->SeriesModalities[i]) == 0)
data/ctn-3.2.0~dfsg/apps/query_client/format.c:32:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(buf, " ");
data/ctn-3.2.0~dfsg/apps/query_client/query_interface.c:331:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(patient.PatientName, "*");
data/ctn-3.2.0~dfsg/apps/ris_gateway/association.c:343:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(params->callingImplementationClassUID) == 0) {
data/ctn-3.2.0~dfsg/apps/rsa_ui/UxMethod.c:230:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Names[NumNames] = (char *) UxMalloc(strlen(name) + 1);
data/ctn-3.2.0~dfsg/apps/rsa_ui/UxXt.c:589:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    from.size = strlen(fontlist_str) + 1;
data/ctn-3.2.0~dfsg/apps/rsa_ui/UxXt.c:631:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    maxlen = strlen(value_str) + 1;
data/ctn-3.2.0~dfsg/apps/rsa_ui/UxXt.c:675:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fg_from.size = strlen(XtDefaultForeground);
data/ctn-3.2.0~dfsg/apps/rsa_ui/UxXt.c:678:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bg_from.size = strlen(XtDefaultBackground);
data/ctn-3.2.0~dfsg/apps/rsa_ui/UxXt.h:74:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	XtVaTypedArg, (res_name), XmRString, (res_value), strlen(res_value) + 1
data/ctn-3.2.0~dfsg/apps/rsa_ui/rsa_ui.c:182:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(applicationTitle, *++argv, sizeof(applicationTitle) - 1);
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:133:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(p2, "/");
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:287:8:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	      strcat(xferSyntaxBuf, ";");
data/ctn-3.2.0~dfsg/apps/send_image/send_image.c:536:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(lastSOPClass) != 0) {
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:187:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(studyInstanceUID) != 0) {
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:193:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if (strlen(accessionNumber) != 0) {
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:402:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(patientID) != 0) {
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:406:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(studyInstanceUID) != 0) {
data/ctn-3.2.0~dfsg/apps/send_results/send_results.c:410:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(accessionNumber) != 0) {
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:486:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(patientID) != 0) {
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:490:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(studyInstanceUID) != 0) {
data/ctn-3.2.0~dfsg/apps/send_study/send_study.c:494:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(accessionNumber) != 0) {
data/ctn-3.2.0~dfsg/apps/simple_pacs/simple_pacs.c:685:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while (strlen(*classArray) != 0) {
data/ctn-3.2.0~dfsg/apps/simple_pacs/simple_pacs.c:733:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(params->callingImplementationClassUID) == 0) {
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1326:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(newDirectory, "/");
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1332:6:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	    strcat(newDirectory, "/");
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1335:6:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	    strcat(newDirectory, "/");
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1338:6:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	    strcat(newDirectory, "/");
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1486:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(fileName) == 0) {
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:1656:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	titleElement.length = strlen(titleElement.d.string);
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:2090:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while (strlen(*classArray) != 0) {
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:2138:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(params->callingImplementationClassUID) == 0) {
data/ctn-3.2.0~dfsg/apps/simple_storage/simple_storage.c:2147:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(title) != 0) {
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:146:17:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                strcat(p2, "/");
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:325:8:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	      strcat(xferSyntaxBuf, ";");
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:394:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return strlen(ipaddr);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:432:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(prefix);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:452:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len += strlen(ip)+1;
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:456:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(uid, ".");
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:459:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strlen(uid);
data/ctn-3.2.0~dfsg/apps/spray_image/spray_image.c:774:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(lastSOPClass, "");
data/ctn-3.2.0~dfsg/apps/storage_commit/association.c:463:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(params->callingImplementationClassUID) == 0) {
data/ctn-3.2.0~dfsg/apps/storage_commit/commit_request.c:136:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	e.length = strlen(transactionUID);
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c:316:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(patientID) != 0) {
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c:320:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(studyInstanceUID) != 0) {
data/ctn-3.2.0~dfsg/apps/storage_commit/storage_commit.c:324:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(accessionNumber) != 0) {
data/ctn-3.2.0~dfsg/apps/wlma_ui/UxMethod.c:230:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Names[NumNames] = (char *) UxMalloc(strlen(name) + 1);
data/ctn-3.2.0~dfsg/apps/wlma_ui/UxXt.c:589:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    from.size = strlen(fontlist_str) + 1;
data/ctn-3.2.0~dfsg/apps/wlma_ui/UxXt.c:631:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    maxlen = strlen(value_str) + 1;
data/ctn-3.2.0~dfsg/apps/wlma_ui/UxXt.c:675:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fg_from.size = strlen(XtDefaultForeground);
data/ctn-3.2.0~dfsg/apps/wlma_ui/UxXt.c:678:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bg_from.size = strlen(XtDefaultBackground);
data/ctn-3.2.0~dfsg/apps/wlma_ui/UxXt.h:74:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	XtVaTypedArg, (res_name), XmRString, (res_value), strlen(res_value) + 1
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:239:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(p->PatSex, "M");
data/ctn-3.2.0~dfsg/apps/wlma_ui/databaseForm.c:241:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(p->PatSex, "F");
data/ctn-3.2.0~dfsg/apps/wlma_ui/wlma_ui.c:182:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(applicationTitle, *argv, sizeof(applicationTitle) - 1);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:37:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(dateString, "");
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/archive_cgi.c:736:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(txt, e->d.string, stringLength);
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:96:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	       strlen(p->query.patient.patNam.personName),
data/ctn-3.2.0~dfsg/cgi_apps/archive_cgi/queryCTN.c:425:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  query.patient.patID.length = strlen(patientID);
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:108:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  c = parentPath + strlen(parentPath);
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:161:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(txt, e->d.string, stringLength);
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:300:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(currentDirectory, "/");
data/ctn-3.2.0~dfsg/cgi_apps/fileview/fileview.c:1180:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(txt, e->d.string, stringLength);
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:74:34:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ( (i<=bufsize) && ((ch = getc(stdin)) != '\n') ) {
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:119:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = strlen(buffer);
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:144:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(entry.value,"");
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:188:28:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  for (i=0; (i<lim) && ((c=getchar())!=EOF) && (c!='\n'); i++) {
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:248:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(entry.value,"");
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:257:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(tempstr) >= BUFSIZ)
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:259:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				       strlen(tempstr)+1);
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:278:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      uploadfname = (char *)malloc(strlen(UPLOADDIR)+strlen(entry.value)+2);
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:278:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      uploadfname = (char *)malloc(strlen(UPLOADDIR)+strlen(entry.value)+2);
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:536:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(cookies);
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:543:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(entry.value,"");
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:650:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *newstring = (char *)malloc(sizeof(char) * (strlen(str) * 2 + 1));
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/cgi-lib.c:652:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (i = 0; i < strlen(str); i++) {
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/string-lib.c:17:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *tempstr = (char *)malloc(sizeof(char) * strlen(str) + 1);
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/string-lib.c:32:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    slen = strlen(str);
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/string-lib.c:54:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  newstring = (char *)malloc(sizeof(char) * (strlen(str) * 4 + 1));
data/ctn-3.2.0~dfsg/external/cgihtml-1.69/string-lib.c:55:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (i = 0; i < strlen(str); i++) {
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:164:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		   temp.quota, temp.read, temp.write);
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:214:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		   pdb->quota, pdb->read, pdb->write);
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:221:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    ENV(pdb->read);
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.c:229:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    sub_escape(pdb->read);
data/ctn-3.2.0~dfsg/facilities/cfg/cfg.h:88:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	char read[18];
data/ctn-3.2.0~dfsg/facilities/condition/condition.c:292:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	(void) strncpy(text, EDBStack[stackPtr].statusText, maxlength - 1);
data/ctn-3.2.0~dfsg/facilities/condition/condition.c:507:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i = strlen(EDBStack[j].statusText);
data/ctn-3.2.0~dfsg/facilities/condition/condition.c:510:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(txt, EDBStack[j].statusText, i);
data/ctn-3.2.0~dfsg/facilities/database/database.c:4538:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(year, date, 4);
data/ctn-3.2.0~dfsg/facilities/database/database.c:4540:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(month, date + 4, 2);
data/ctn-3.2.0~dfsg/facilities/database/database.c:4542:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(day, date + 6, 2);
data/ctn-3.2.0~dfsg/facilities/database/database.c:4613:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i = 0; i < strlen(fracsec) - 1; i++)
data/ctn-3.2.0~dfsg/facilities/database/database.c:4658:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((ndate = (char *) malloc(strlen(datestring) + 1)) == (char *) NULL)
data/ctn-3.2.0~dfsg/facilities/database/database.c:4675:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	} else if (ndate[strlen(ndate) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/database/database.c:4709:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((ntime = (char *) malloc(strlen(timestring) + 2)) == (char *) NULL)
data/ctn-3.2.0~dfsg/facilities/database/database.c:4726:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	} else if (ntime[strlen(ntime) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:183:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(params->calledAPTitle) < 1 || strlen(params->calledAPTitle) > 16)
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:183:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(params->calledAPTitle) < 1 || strlen(params->calledAPTitle) > 16)
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:189:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(params->callingAPTitle) < 1 || strlen(params->callingAPTitle) > 16)
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:189:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(params->callingAPTitle) < 1 || strlen(params->callingAPTitle) > 16)
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:504:12:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void) strncpy((char *) b, assoc->calledAPTitle, strlen(assoc->calledAPTitle));
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:504:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (void) strncpy((char *) b, assoc->calledAPTitle, strlen(assoc->calledAPTitle));
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:506:12:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void) strncpy((char *) b, assoc->callingAPTitle,
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:507:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		   strlen(assoc->callingAPTitle));
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:700:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(name) < 1 || strlen(name) > 64)
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:700:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(name) < 1 || strlen(name) > 64)
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:706:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    subItem->length = (unsigned short) strlen(name);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:893:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(params->callingImplementationVersionName) != 0) {
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:904:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(params->calledImplementationVersionName) != 0) {
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:1111:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(name) < 1 || strlen(name) > 64)
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:1111:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(name) < 1 || strlen(name) > 64)
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:1119:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    scuscpItem->length = (unsigned short) (strlen(name) + 2 + 2);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulconstruct.c:1414:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = strlen(scuscpRole->SOPClassUID);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:677:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     strlen(stateEntries[index].eventName) == 0; idx2++) {
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulfsm.c:3647:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bytesRead = read(sock, b, l);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulparse.c:163:12:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void) strncpy(assoc->calledAPTitle, (char *) buf, 16);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulparse.c:168:12:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void) strncpy(assoc->callingAPTitle, (char *) buf, 16);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulpresent.c:162:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(transferSyntax) != 0) {
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulpresent.c:208:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy((ctx)->acceptedTransferSyntax, "");
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulpresent.c:210:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(*xferSyntaxes) != 0) {
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulpresent.c:244:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(*xferSyntaxes) != 0) {
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:321:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    bytesRead = read(*fd, buf, nbyte);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:1606:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(100000);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:2292:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	(void) strncpy(params->callingPresentationAddress, node, size);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulprotocol.c:2595:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((paramType == DUL_K_STRING) && (outputLength < strlen(paramAddress)))
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:444:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    read_itoa = read(fd_itoa, &itoa_hdr, 12);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:475:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		    if ((read(fd_itoa, buffer, itoa_hdr.len)) == itoa_hdr.len) {
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:499:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    read_atoi = read(fd_atoi, &atoi_hdr, 12);
data/ctn-3.2.0~dfsg/facilities/dulprotocol/dulsnoop.c:516:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if ((read(fd_atoi, buffer, atoi_hdr.len)) == atoi_hdr.len) {
data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c:302:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((s->Flag & FIS_K_STUDYCOMP_STUCOMUID) && (strlen(s->StuComUID) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c:310:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((s->Flag & FIS_K_STUDYCOMP_STUINSUID) && (strlen(s->StuInsUID) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c:369:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((s->Flag & FIS_K_SCSERIES_SERINSUID) && (strlen(s->SerInsUID) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c:377:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((s->Flag & FIS_K_SCSERIES_STUCOMUID) && (strlen(s->StuComUID) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c:427:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((s->Flag & FIS_K_SCIMAGE_SOPINSUID) && (strlen(s->SOPInsUID) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c:436:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((s->Flag & FIS_K_SCIMAGE_SERINSUID) && (strlen(s->SerInsUID) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c:444:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((s->Flag & FIS_K_SCIMAGE_STUCOMUID) && (strlen(s->StuComUID) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c:450:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((s->Flag & FIS_K_SCIMAGE_SOPCLAUID) && (strlen(s->SOPClaUID) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c:511:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((s->Flag & FIS_K_RESULTS_RESUID) && (strlen(s->ResUID) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c:518:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((s->Flag & FIS_K_RESULTS_STUINSUID) && (strlen(s->StuInsUID) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c:586:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((s->Flag & FIS_K_INTERP_INTUID) && (strlen(s->IntUID) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c:593:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((s->Flag & FIS_K_INTERP_RESUID) && (strlen(s->ResUID) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c:667:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((s->Flag & FIS_K_SCOMMIT_TRAUID) && (strlen(s->TraUID) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c:674:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((s->Flag & FIS_K_SCOMMIT_REQAE) && (strlen(s->ReqAE) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c:729:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((s->Flag & FIS_K_COMMITSOP_TRAUID) && (strlen(s->TraUID) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c:736:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((s->Flag & FIS_K_COMMITSOP_SOPCLAUID) && (strlen(s->SOPClaUID) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c:743:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((s->Flag & FIS_K_COMMITSOP_SOPINSUID) && (strlen(s->SOPInsUID) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c:773:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((r->Flag & FIS_K_WORKQUEUE_TASNAM) && (strlen(r->TasNam) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/fisinsert.c:780:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((r->Flag & FIS_K_WORKQUEUE_TASID) && (strlen(r->TasID) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/record.c:296:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(record->InsCreUID, "");
data/ctn-3.2.0~dfsg/facilities/fis/record.c:343:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(record->InsCreUID, "");
data/ctn-3.2.0~dfsg/facilities/fis/update.c:377:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((r->Flag & FIS_K_RESULTS_STUINSUID) && (strlen(r->StuInsUID) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/update.c:438:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((r->Flag & FIS_K_INTERP_RESUID) && (strlen(r->ResUID) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/update.c:518:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((r->Flag & FIS_K_SCOMMIT_REQAE) && (strlen(r->ReqAE) != 0)) {
data/ctn-3.2.0~dfsg/facilities/fis/update.c:522:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((r->Flag & FIS_K_SCOMMIT_RESAE) && (strlen(r->ResAE) != 0)) {
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:949:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (buf[strlen(buf) - 1] != '/')
data/ctn-3.2.0~dfsg/facilities/gq/gq.c:950:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(buf, "/");
data/ctn-3.2.0~dfsg/facilities/hap/hap.c:337:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		queryLevelElement.length = strlen(queryLevelElement.d.string);
data/ctn-3.2.0~dfsg/facilities/hap/hap.c:364:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    e.length = strlen(e.d.string);
data/ctn-3.2.0~dfsg/facilities/hap/hap.c:407:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		e.length = strlen(e.d.string);
data/ctn-3.2.0~dfsg/facilities/hap/hap.c:445:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	classElement.length = strlen(SOPArray);
data/ctn-3.2.0~dfsg/facilities/hap/hap.c:450:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	uidElement.length = strlen(UIDArray);
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_file.c:260:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((read(GS_hunkfd, (char *) &GS_hfh, sizeof(HunkFileHeader))) !=
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_file.c:295:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    rb = read(GS_hunkfd, (char *) GS_hunkstorage, GS_hfh.hunk_length);
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_file.c:514:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((read(GS_hunkfd, (char *) &GS_hfh, sizeof(HunkFileHeader))) !=
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_file.c:608:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    rb = read(GS_hunkfd, (char *) GS_hunkstorage, GS_hfh.hunk_length);
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_man.c:347:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((read(GS_hunkfd, (char *) &GS_hfh, sizeof(HunkFileHeader))) !=
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_man.c:382:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    rb = read(GS_hunkfd, (char *) GS_hunkstorage, GS_hfh.hunk_length);
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_man.c:597:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((read(GS_hunkfd, (char *) &GS_hfh, sizeof(HunkFileHeader))) !=
data/ctn-3.2.0~dfsg/facilities/hunks/hunk_man.c:690:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    rb = read(GS_hunkfd, (char *) GS_hunkstorage, GS_hfh.hunk_length);
data/ctn-3.2.0~dfsg/facilities/iap/iap.c:541:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		queryLevelElement.length = strlen(queryLevelElement.d.string);
data/ctn-3.2.0~dfsg/facilities/icon/icon.c:167:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((fdcond = read(fd, (char *) &temp, sizeof(ICON_STUDYOFFSET))) ==
data/ctn-3.2.0~dfsg/facilities/icon/icon.c:360:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while (((fdcond = read(fd, (char *) &temp, sizeof(ICON_STUDYICON))) ==
data/ctn-3.2.0~dfsg/facilities/icon/icon.c:411:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((fdcond = read(fd, (char *) &studyicon, sizeof(ICON_STUDYICON))) ==
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:768:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((tdb = (char *) malloc(strlen(databaseName) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:1011:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    temp_node = (LST_NODE *) malloc((2 * sizeof(void *)) + (strlen(uid) +1));
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:1596:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    temp_node = (LST_NODE *) malloc((2 * sizeof(void *)) + strlen(field->Value.Value.String) + 1);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:1613:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    temp_node = (LST_NODE *) malloc((2 * sizeof(void *)) + strlen(field->Value.Value.String) + 1);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:1630:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    temp_node = (LST_NODE *) malloc((2 * sizeof(void *)) + strlen(field->Value.Value.String) + 1);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:1897:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((temp = (char *) malloc(strlen(GS_StuNodes[i].StuInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:1903:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numsercrits].Value.AllocatedSize = strlen(GS_StuNodes[i].StuInsUID);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:1904:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numsercrits].Value.Size = strlen(GS_StuNodes[i].StuInsUID);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:1956:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((temp = (char *) malloc(strlen(GS_SerNodes[i].SerInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:1962:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numimacrits].Value.AllocatedSize = strlen(GS_SerNodes[i].SerInsUID);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:1963:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numimacrits].Value.Size = strlen(GS_SerNodes[i].SerInsUID);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2360:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((temp = (char *) malloc(strlen(GS_PatNodes[i].PatID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2366:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numstucrits].Value.AllocatedSize = strlen(GS_PatNodes[i].PatID);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2367:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numstucrits].Value.Size = strlen(GS_PatNodes[i].PatID);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2418:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((temp = (char *) malloc(strlen(GS_StuNodes[i].StuInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2424:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numsercrits].Value.AllocatedSize = strlen(GS_StuNodes[i].StuInsUID);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2425:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numsercrits].Value.Size = strlen(GS_StuNodes[i].StuInsUID);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2478:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((temp = (char *) malloc(strlen(GS_SerNodes[i].SerInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2484:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numimacrits].Value.AllocatedSize = strlen(GS_SerNodes[i].SerInsUID);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2485:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numimacrits].Value.Size = strlen(GS_SerNodes[i].SerInsUID);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2856:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((temp = (char *) malloc(strlen(GS_SerNodes[i].SerInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2862:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numimacrits].Value.AllocatedSize = strlen(GS_SerNodes[i].SerInsUID);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:2863:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numimacrits].Value.Size = strlen(GS_SerNodes[i].SerInsUID);
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3822:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if (pssi->patient.PatBirTim[strlen(pssi->patient.PatBirTim) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3846:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if (pssi->patient.PatBirDat[strlen(pssi->patient.PatBirDat) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3908:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if (pssi->patient.InsertDate[strlen(pssi->patient.InsertDate) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3932:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if (pssi->patient.InsertTime[strlen(pssi->patient.InsertTime) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:3992:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if (pssi->study.StuDat[strlen(pssi->study.StuDat) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:4016:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if (pssi->study.StuTim[strlen(pssi->study.StuTim) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:4148:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if (pssi->study.InsertDate[strlen(pssi->study.InsertDate) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:4172:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if (pssi->study.InsertTime[strlen(pssi->study.InsertTime) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:4274:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->patient.PatBirTim[strlen(pssi->patient.PatBirTim) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:4298:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->patient.PatBirDat[strlen(pssi->patient.PatBirDat) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:4360:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->patient.InsertDate[strlen(pssi->patient.InsertDate) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:4384:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->patient.InsertTime[strlen(pssi->patient.InsertTime) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:4446:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->study.StuDat[strlen(pssi->study.StuDat) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:4470:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->study.StuTim[strlen(pssi->study.StuTim) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:4602:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->study.InsertDate[strlen(pssi->study.InsertDate) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:4626:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->study.InsertTime[strlen(pssi->study.InsertTime) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:4778:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->series.InsertDate[strlen(pssi->series.InsertDate) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:4802:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->series.InsertTime[strlen(pssi->series.InsertTime) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:4961:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->image.InsertDate[strlen(pssi->image.InsertDate) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:4985:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->image.InsertTime[strlen(pssi->image.InsertTime) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:5043:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(GS_IMASEL_SOPInsUIDList, "\"");
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:5045:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(GS_IMASEL_SOPInsUIDList, "\"");
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:5048:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		    strcat(GS_IMASEL_SOPInsUIDList, ",");
data/ctn-3.2.0~dfsg/facilities/idb/idb.c:5828:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    temp_node = (LST_NODE *) malloc((2 * sizeof(void *)) + strlen(field->Value.Value.String) + 1);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:469:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(src->patient.patNam.personName),
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:482:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   strlen(src->patient.patID.text),
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:499:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(src->patient.patNam.personName),
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:512:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   strlen(src->patient.patID.text),
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:529:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(src->patient.patNam.personName),
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:542:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   strlen(src->patient.patID.text),
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:1193:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  CHR_IterateBegin(c, strlen(c), encoding, &ctx);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:1806:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((tdb = (char *) malloc(strlen(databaseName) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:1993:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(localUID, uid, sizeof(localUID) - 1);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:2031:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    temp_node = (LST_NODE *) malloc((2 * sizeof(void *)) + (strlen(localUID) +1));
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:2602:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    temp_node = (LST_NODE *) malloc((2 * sizeof(void *)) + strlen(field->Value.Value.String) + 1);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:2619:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    temp_node = (LST_NODE *) malloc((2 * sizeof(void *)) + strlen(field->Value.Value.String) + 1);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:2636:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    temp_node = (LST_NODE *) malloc((2 * sizeof(void *)) + strlen(field->Value.Value.String) + 1);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:2906:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((temp = (char *) malloc(strlen(GS_StuNodes[i].StuInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:2912:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numsercrits].Value.AllocatedSize = strlen(GS_StuNodes[i].StuInsUID);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:2913:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numsercrits].Value.Size = strlen(GS_StuNodes[i].StuInsUID);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:2964:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((temp = (char *) malloc(strlen(GS_SerNodes[i].SerInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:2970:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numimacrits].Value.AllocatedSize = strlen(GS_SerNodes[i].SerInsUID);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:2971:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numimacrits].Value.Size = strlen(GS_SerNodes[i].SerInsUID);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3377:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((temp = (char *) malloc(strlen(GS_PatNodes[i].patID.text) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3384:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numstucrits].Value.AllocatedSize = strlen(GS_PatNodes[i].patID.text);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3385:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numstucrits].Value.Size = strlen(GS_PatNodes[i].patID.text);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3441:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((temp = (char *) malloc(strlen(GS_StuNodes[i].StuInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3447:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numsercrits].Value.AllocatedSize = strlen(GS_StuNodes[i].StuInsUID);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3448:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numsercrits].Value.Size = strlen(GS_StuNodes[i].StuInsUID);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3500:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((temp = (char *) malloc(strlen(GS_SerNodes[i].SerInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3506:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numimacrits].Value.AllocatedSize = strlen(GS_SerNodes[i].SerInsUID);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3507:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numimacrits].Value.Size = strlen(GS_SerNodes[i].SerInsUID);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3910:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((temp = (char *) malloc(strlen(GS_SerNodes[i].SerInsUID) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3916:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numimacrits].Value.AllocatedSize = strlen(GS_SerNodes[i].SerInsUID);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:3917:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		criteria[numimacrits].Value.Size = strlen(GS_SerNodes[i].SerInsUID);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4372:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		GS_PatNodes[i].patNam.length = strlen(fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4379:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		GS_PatNodes[i].patID.length = strlen(fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4479:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		GS_StuNodes[i].accNum.length = strlen(fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4486:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		GS_StuNodes[i].stuID.length = strlen(fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4499:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		GS_StuNodes[i].refPhyNam.length = strlen(fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4506:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		GS_StuNodes[i].stuDes.length = strlen(fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4540:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    GS_StuNodes[i].patParent.length = strlen(fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4625:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		GS_SerNodes[i].proNam.length = strlen(fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4632:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		GS_SerNodes[i].serDes.length = strlen(fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4890:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if (pssi->patient.PatBirTim[strlen(pssi->patient.PatBirTim) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4914:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if (pssi->patient.PatBirDat[strlen(pssi->patient.PatBirDat) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:4977:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if (pssi->patient.InsertDate[strlen(pssi->patient.InsertDate) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:5001:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if (pssi->patient.InsertTime[strlen(pssi->patient.InsertTime) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:5064:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if (pssi->study.StuDat[strlen(pssi->study.StuDat) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:5088:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if (pssi->study.StuTim[strlen(pssi->study.StuTim) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:5228:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if (pssi->study.InsertDate[strlen(pssi->study.InsertDate) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:5252:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if (pssi->study.InsertTime[strlen(pssi->study.InsertTime) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:5372:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->patient.PatBirTim[strlen(pssi->patient.PatBirTim) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:5396:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->patient.PatBirDat[strlen(pssi->patient.PatBirDat) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:5459:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->patient.InsertDate[strlen(pssi->patient.InsertDate) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:5483:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->patient.InsertTime[strlen(pssi->patient.InsertTime) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:5548:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->study.StuDat[strlen(pssi->study.StuDat) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:5572:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->study.StuTim[strlen(pssi->study.StuTim) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:5712:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->study.InsertDate[strlen(pssi->study.InsertDate) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:5736:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->study.InsertTime[strlen(pssi->study.InsertTime) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:5898:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->series.InsertDate[strlen(pssi->series.InsertDate) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:5922:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->series.InsertTime[strlen(pssi->series.InsertTime) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:6089:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->image.InsertDate[strlen(pssi->image.InsertDate) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:6113:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    } else if (pssi->image.InsertTime[strlen(pssi->image.InsertTime) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:6174:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(GS_IMASEL_SOPInsUIDList, "\"");
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:6176:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(GS_IMASEL_SOPInsUIDList, "\"");
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:6179:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		    strcat(GS_IMASEL_SOPInsUIDList, ",");
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:6243:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	malloced_size = strlen(regex) + 20;
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:6248:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    CHR_IterateBegin(regex, strlen(regex), CHR_EUC_JP, &ctx);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:6876:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    temp_node = (LST_NODE *) malloc((2 * sizeof(void *)) + strlen(field->Value.Value.String) + 1);
data/ctn-3.2.0~dfsg/facilities/idbmb/idbmb.c:6997:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(hc->charSet) != 0) {
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:141:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(w->StuDat, "");
data/ctn-3.2.0~dfsg/facilities/irs/irs.c:295:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(r.StuDat) != 0)
data/ctn-3.2.0~dfsg/facilities/manage/control.c:396:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(databaseWork.Access);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:398:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
	strncat(databaseWork.Access, "xxxxxx", 9 - len);
data/ctn-3.2.0~dfsg/facilities/manage/control.c:574:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(scratch) >= fileNameLength) {
data/ctn-3.2.0~dfsg/facilities/manage/control.c:576:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		     strlen(scratch), fileNameLength, "DMAN_TempImageFile");
data/ctn-3.2.0~dfsg/facilities/manage/control.c:658:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(scratch) >= fileNameLength) {
data/ctn-3.2.0~dfsg/facilities/manage/control.c:660:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		     strlen(scratch), fileNameLength, "DMAN_PermImageFile");
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:97:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    uidElement.length = strlen(request.UID);
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:152:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    elementList[0].length = strlen(response.UID);
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:215:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(store->classUID) == 0)
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:218:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(store->instanceUID) == 0)
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:231:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    e.length = strlen(e.d.string);
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:240:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		e.length = strlen(e.d.string);
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:293:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(store->classUID) == 0)
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:296:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(store->instanceUID) == 0)
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:303:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    elementList[index].length = strlen(response.classUID);
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:305:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    elementList[index].length = strlen(response.instanceUID);
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:360:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(find->classUID) == 0)
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:367:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    elementList[index].length = strlen(request.classUID);
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:423:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(find->classUID) == 0)
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:430:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    elementList[index].length = strlen(response.classUID);
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:487:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(move->classUID) == 0)
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:494:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    elementList[index].length = strlen(request.classUID);
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:496:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    elementList[index].length = strlen(request.moveDestination);
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:582:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(move->classUID) == 0)
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:589:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    elementList[index].length = strlen(response.classUID);
data/ctn-3.2.0~dfsg/facilities/messages/cbuild.c:607:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		e.length = strlen(e.d.string);
data/ctn-3.2.0~dfsg/facilities/motif_utl/motifutil.c:152:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(txt) == 0)
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:290:6:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	    strcat(mapName, ".");
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:977:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			nBytes = read((*object)->fd, element->d.ot, (int) l);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1113:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  s = (char*) malloc(strlen(tmp) + 1);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1172:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		    nBytes = read((*object)->fd, element->d.ot, (int) l);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1685:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		    strncpy(scratch, elementItem->element.d.string, stringLength);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1709:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		    strncpy(scratch, elementItem->element.d.string, stringLength);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1748:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		    strncpy(scratch, elementItem->element.d.string, stringLength);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1755:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		    strncpy(scratch, elementItem->element.d.string, stringLength);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1880:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		    strncpy(scratch, elementItem->element.d.string, stringLength);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1906:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		    strncpy(scratch, elementItem->element.d.string, stringLength);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1938:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		    strcat(localPrefix, " ");
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1947:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		    strncpy(scratch, elementItem->element.d.string, stringLength);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:1954:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		    strncpy(scratch, elementItem->element.d.string, stringLength);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:2155:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    e.length = strlen(e.d.string);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:2175:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		e.length = strlen(e.d.string);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:2725:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    e.length = strlen(s);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3485:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy((*object)->waveformDataVR, item->element.d.string,
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3566:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(s, "");
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:3837:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    nBytes = read((*object)->fd, b, (int) length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:4019:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	nBytes = read((*object)->fd, buffer, length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:4207:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	nBytes = read((*object)->fd, buffer, length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:5223:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		nBytes = read(fd, buf, 4);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:5255:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		    nBytes = read(fd, buf, 4);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:5281:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		    nBytes = read(fd, buf, 4);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:5353:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			nBytes = read(fd, buf, 8);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:5462:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			nBytes = read(fd, elementItem->element.d.ot,
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:5627:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    nBytes = read(fd, (*object)->preamble, DCM_PREAMBLELENGTH);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:5628:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    nBytes += read(fd, label, sizeof(label));
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:5693:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    nBytes = read(fd, buf, 4);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:5776:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    nBytes = read(fd, buf, 4);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:5865:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		    nBytes = read(fd, buf, 4);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:6188:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		nBytes = read(fd, (*elementItem)->element.d.ot,
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:6791:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    nBytes = read((*object)->fd, to->d.ot, (int) l);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:6843:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read(fd, buf, 24) != 24)
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:7169:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		nBytes = read((*object)->fd, offsetBuffer, e.length);
data/ctn-3.2.0~dfsg/facilities/objects/dcm.c:7199:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		nBytes = read((*object)->fd, buf, toRead);
data/ctn-3.2.0~dfsg/facilities/objects/dcmdict.c:2422:12:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    (void) strcpy(element->description, "");
data/ctn-3.2.0~dfsg/facilities/objects/dcmsupport.c:122:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length += strlen(c) + 1;
data/ctn-3.2.0~dfsg/facilities/objects/dcmsupport.c:141:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(c);
data/ctn-3.2.0~dfsg/facilities/print/print.c:498:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    length = strlen(PRNbfbAttrib.referencedFilmSessionSOPInstanceUID);
data/ctn-3.2.0~dfsg/facilities/print/print.c:554:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    length = strlen(PRNbfbAttrib.refPrintJobInstanceUID);
data/ctn-3.2.0~dfsg/facilities/services/find.c:525:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	queryLevelElement.length = strlen(queryLevelString);
data/ctn-3.2.0~dfsg/facilities/services/services.c:1324:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((dirName == NULL) || (strlen(dirName) == 0)) {
data/ctn-3.2.0~dfsg/facilities/services/services.c:1331:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	(void) strcpy(dirName, ".");	/* make the directory name as current
data/ctn-3.2.0~dfsg/facilities/services/srv1.c:302:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(paramName, "/");
data/ctn-3.2.0~dfsg/facilities/services/srv1.c:327:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(paramName, "/");
data/ctn-3.2.0~dfsg/facilities/services/srv2.c:409:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((dirName == NULL) || (strlen(dirName) == 0)) {
data/ctn-3.2.0~dfsg/facilities/services/storage.c:175:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(fileMeta->privateInformationCreatorUID, "");
data/ctn-3.2.0~dfsg/facilities/services/storage.c:529:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(fileName) == 0) {
data/ctn-3.2.0~dfsg/facilities/tbl/sybase.c:179:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if( (tdb=(char *)malloc(strlen(databaseName)+1)) == (char *)NULL ){
data/ctn-3.2.0~dfsg/facilities/tbl/sybase.c:183:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if( (ttb=(char *)malloc(strlen(tableName)+1)) == (char *)NULL ){
data/ctn-3.2.0~dfsg/facilities/tbl/tbl.h:127:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	(v)->Size = strlen((s)); \
data/ctn-3.2.0~dfsg/facilities/tbl/tbl.h:163:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.Size=strlen((s));		\
data/ctn-3.2.0~dfsg/facilities/tbl/tbl.h:164:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.AllocatedSize=strlen((s))+1;\
data/ctn-3.2.0~dfsg/facilities/tbl/tbl.h:173:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.Size=strlen((s));		\
data/ctn-3.2.0~dfsg/facilities/tbl/tbl.h:174:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.AllocatedSize=strlen((s))+1;\
data/ctn-3.2.0~dfsg/facilities/tbl/tbl.h:177:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.Size=strlen((s));		\
data/ctn-3.2.0~dfsg/facilities/tbl/tbl.h:178:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.AllocatedSize=strlen((s))+1;\
data/ctn-3.2.0~dfsg/facilities/tbl/tbl.h:188:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.Size=strlen((s));		\
data/ctn-3.2.0~dfsg/facilities/tbl/tbl.h:189:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.AllocatedSize=strlen((s))+1;\
data/ctn-3.2.0~dfsg/facilities/tbl/tbl.h:192:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.Size=strlen((s));		\
data/ctn-3.2.0~dfsg/facilities/tbl/tbl.h:193:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.AllocatedSize=strlen((s))+1;\
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:238:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	    strcpy(server_name, "");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:269:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((tdb = (char *) malloc(strlen(databaseName) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:276:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((ttb = (char *) malloc(strlen(tableName) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:616:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		    strncpy(fp->Value.Value.String, row[i], fp->Value.AllocatedSize - 1);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1195:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    foo = malloc(strlen(str) + 3);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1211:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    foo = malloc(strlen(fp->FieldName) + 3);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1259:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    foos = malloc(strlen(up->Value.Value.String) + 3);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1310:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	foos = malloc(strlen(fp->Value.Value.String) + 3);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1382:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    foos = malloc(strlen(cp->Value.Value.String) + 3);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1414:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (MSQLCMDBUFSIZE > strlen(str) + 1) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1417:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    G_DBSelectSize = strlen(str) + MSQLCMDBUFSIZE;
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1423:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while (G_DBSelectSize < (strlen(*cmdbuffer) + strlen(str) + 1)) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_msql.c:1423:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while (G_DBSelectSize < (strlen(*cmdbuffer) + strlen(str) + 1)) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:281:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((tdb = (char *) malloc(strlen(databaseName) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:288:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((ttb = (char *) malloc(strlen(tableName) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:543:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (mysql_real_query(&mysql, G_DBSelect, (unsigned int)strlen(G_DBSelect)) != 0) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:631:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		    strncpy(fp->Value.Value.String, row[i], fp->Value.AllocatedSize - 1);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:768:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (mysql_real_query(&mysql, G_DBUpdate, (unsigned int)strlen(G_DBUpdate)) != 0) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:850:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (mysql_real_query(&mysql, G_DBNextUnique, (unsigned int)strlen(G_DBNextUnique)) != 0) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:879:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (mysql_real_query(&mysql, G_DBNextUnique, (unsigned int)strlen(G_DBNextUnique)) != 0) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:995:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (mysql_real_query(&mysql, G_DBInsert, (unsigned int)strlen(G_DBInsert)) != 0) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1105:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (mysql_real_query(&mysql, G_DBDelete, (unsigned int)strlen(G_DBDelete)) != 0) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1237:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    foo = malloc(strlen(str) + 3);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1253:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    foo = malloc(strlen(fp->FieldName) + 3);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1301:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    foos = malloc(strlen(up->Value.Value.String) + 3);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1352:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	foos = malloc(strlen(fp->Value.Value.String) + 3);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1424:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    foos = malloc(strlen(cp->Value.Value.String) + 3);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1456:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (MYSQLCMDBUFSIZE > strlen(str) + 1) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1459:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    G_DBSelectSize = strlen(str) + MYSQLCMDBUFSIZE;
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1465:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while (G_DBSelectSize < (strlen(*cmdbuffer) + strlen(str) + 1)) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_mysql.c:1465:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while (G_DBSelectSize < (strlen(*cmdbuffer) + strlen(str) + 1)) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:150:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(quote, "'");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:154:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    pData = command + strlen(command);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:263:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      strcpy(quote, "'");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:266:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      pData = command + strlen(command);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:300:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  c = command + strlen(command);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:488:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(fp->Value.Value.String,
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:493:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:651:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((tdb = (char *) malloc(strlen(databaseName) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:658:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((ttb = (char *) malloc(strlen(tableName) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:739:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((tdb = (char *) malloc(strlen(databaseName) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:746:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((ttb = (char *) malloc(strlen(tableName) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:933:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(selectCommand, ";" );
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1025:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(selectCommand, ";" );
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1146:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(updateCommand, ";" );
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1214:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(updateCommand, ";" );
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1491:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(insertCommand, "(");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1574:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(insertCommand, "(");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1679:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(deleteCommand, ";" );
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1739:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(deleteCommand, ";" );
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_psql.c:1834:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(descbuf, "'");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:163:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	  strcpy(quote, "'");
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:165:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  pData = sqlStatement + strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:319:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							 strlen(fp->Value.Value.Text),
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:322:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							 strlen(fp->Value.Value.Text),
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:346:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						strlen(up->Value.Value.Text),
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:349:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						strlen(up->Value.Value.Text),
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:436:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			for (i = strlen(str); i >= 0; i--) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:499:4:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
			sprintf(temp, "?");		/* To be bound later */
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:736:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			szdsn,(SWORD)strlen(szdsn),
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:737:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			szuid,(SWORD)strlen(szuid),
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:738:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			szpwd,(SWORD)strlen(szpwd));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:797:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((tdb = (char *) malloc(strlen(databaseName) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:802:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((ttb = (char *) malloc(strlen(tableName) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:909:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			szdsn,(SWORD)strlen(szdsn),
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:910:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			szuid,(SWORD)strlen(szuid),
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:911:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			szpwd,(SWORD)strlen(szpwd));
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:969:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((tdb = (char *) malloc(strlen(databaseName) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1182:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1230:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1349:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1397:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1552:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1616:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1696:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1760:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1895:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1907:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1915:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1945:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:1951:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2057:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2119:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2190:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2255:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2300:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2337:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2375:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2478:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2514:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2590:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2626:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2734:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2756:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sqlserver.c:2806:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	iStatementLength = strlen(sqlStatement);
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:334:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((tdb = (char *) malloc(strlen(databaseName) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:341:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((ttb = (char *) malloc(strlen(tableName) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:1796:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(srvname) > 0)
data/ctn-3.2.0~dfsg/facilities/tbl/tbl_sybase.c:1798:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(procname) > 0)
data/ctn-3.2.0~dfsg/facilities/tbl/ufs.c:484:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    field->Value.Size = strlen(field->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb.h:127:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	(v)->Size = strlen((s)); \
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb.h:163:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.Size=strlen((s));		\
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb.h:164:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.AllocatedSize=strlen((s))+1;\
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb.h:173:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.Size=strlen((s));		\
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb.h:174:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.AllocatedSize=strlen((s))+1;\
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb.h:177:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.Size=strlen((s));		\
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb.h:178:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.AllocatedSize=strlen((s))+1;\
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb.h:196:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.Size=strlen((s));		\
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb.h:197:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.AllocatedSize=strlen((s))+1;\
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb.h:200:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.Size=strlen((s));		\
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb.h:201:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (v).Value.AllocatedSize=strlen((s))+1;\
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:182:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(quote, "'");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:186:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    pData = command + strlen(command);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:302:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      strcpy(quote, "'");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:305:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      pData = command + strlen(command);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:340:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  c = command + strlen(command);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:528:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(fp->Value.Value.String,
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:533:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(fp->Value.Value.String);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:693:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	    strcpy(server_name, "");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:725:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((tdb = (char *) malloc(strlen(databaseName) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:732:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((ttb = (char *) malloc(strlen(tableName) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:849:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((tdb = (char *) malloc(strlen(databaseName) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:856:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((ttb = (char *) malloc(strlen(tableName) + 1)) == (char *) NULL) {
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1073:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(selectCommand, ";" );
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1225:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(selectCommand, ";" );
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1347:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(updateCommand, ";" );
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1528:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(updateCommand, ";" );
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1762:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(selectCommand, ";" );
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:1943:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(insertCommand, "(");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2073:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(insertCommand, "(");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2224:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(deleteCommand, ";" );
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2366:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(deleteCommand, ";" );
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2516:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(descbuf, "'");
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2564:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    foo = malloc(strlen(str) + 3);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2580:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    foo = malloc(strlen(fp->FieldName) + 3);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2628:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    foos = malloc(strlen(up->Value.Value.String) + 3);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2679:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	foos = malloc(strlen(fp->Value.Value.String) + 3);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2751:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    foos = malloc(strlen(cp->Value.Value.String) + 3);
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2783:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (MSQLCMDBUFSIZE > strlen(str) + 1) {
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2786:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    G_DBSelectSize = strlen(str) + MSQLCMDBUFSIZE;
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2792:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while (G_DBSelectSize < (strlen(*cmdbuffer) + strlen(str) + 1)) {
data/ctn-3.2.0~dfsg/facilities/tblmb/tblmb_psql.c:2792:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while (G_DBSelectSize < (strlen(*cmdbuffer) + strlen(str) + 1)) {
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:559:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(b.root) == 0)
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:657:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(uidFile) == 0) {
data/ctn-3.2.0~dfsg/facilities/uid/uid.c:692:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  rtnValue = (char*) CTN_MALLOC(strlen(copyValue) + 1);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:288:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(year, date, 4);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:290:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(month, date + 4, 2);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:292:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(day, date + 6, 2);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:394:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i = 0; i < strlen(fracsec); i++)
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:469:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((ndate = (char *) malloc(strlen(datestring) + 1)) == (char *) NULL)
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:486:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	} else if (ndate[strlen(ndate) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:520:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((ntime = (char *) malloc(strlen(timestring) + 2)) == (char *) NULL)
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:537:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	} else if (ntime[strlen(ntime) - 1] == '-') {
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:891:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    item = (CONFIG_ITEM*)malloc(sizeof(*item) + strlen(token1) +
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:892:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(token2) + 2);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:895:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    item->pValue = item->pName + strlen(token1) + 1;
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:919:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    UTL_configFile = (char*) malloc(strlen(p) + strlen("/runtime/ctn_cfg.txt") + 1);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:919:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    UTL_configFile = (char*) malloc(strlen(p) + strlen("/runtime/ctn_cfg.txt") + 1);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:923:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    UTL_configFile = (char*) malloc(strlen(configFile)+1);
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:958:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  idx = strlen(nameCopy) - 1;
data/ctn-3.2.0~dfsg/facilities/utility/utility.c:1000:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  memorySize += strlen(inputText) + 1;
data/ctn-3.2.0~dfsg/facilities/xutl/xutl.c:107:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(fontName, "");
data/ctn-3.2.0~dfsg/facilities/xutl/xutl.c:332:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      str, strlen(str));
data/ctn-3.2.0~dfsg/facilities/xutl/xutl_mb.c:176:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l1 = strlen(str);
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:642:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  e.length = strlen(str);
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:706:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    e1.length = strlen(str);
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:1216:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(birthDate, "");
data/ctn-3.2.0~dfsg/javactn/jni_src/javactn.c:3268:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(mParams->callingPresentationAddress, "");

ANALYSIS SUMMARY:

Hits = 5552
Lines analyzed = 279305 in approximately 7.41 seconds (37703 lines/second)
Physical Source Lines of Code (SLOC) = 181671
Hits@level = [0] 3642 [1] 856 [2] 2488 [3]  49 [4] 2159 [5]   0
Hits@level+ = [0+] 9194 [1+] 5552 [2+] 4696 [3+] 2208 [4+] 2159 [5+]   0
Hits/KSLOC@level+ = [0+] 50.608 [1+] 30.5607 [2+] 25.8489 [3+] 12.1538 [4+] 11.8841 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.