Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/glpk-4.65/examples/cplex/cplex.c
Examining data/glpk-4.65/examples/cplex/cplex.h
Examining data/glpk-4.65/examples/glpsol.c
Examining data/glpk-4.65/examples/iptsamp.c
Examining data/glpk-4.65/examples/mplsamp1.c
Examining data/glpk-4.65/examples/mplsamp2.c
Examining data/glpk-4.65/examples/netgen.c
Examining data/glpk-4.65/examples/nppsamp.c
Examining data/glpk-4.65/examples/oldapi/lpx.c
Examining data/glpk-4.65/examples/oldapi/lpx.h
Examining data/glpk-4.65/examples/oldapi/lpxsamp.c
Examining data/glpk-4.65/examples/sample.c
Examining data/glpk-4.65/examples/spxsamp1.c
Examining data/glpk-4.65/examples/spxsamp2.c
Examining data/glpk-4.65/examples/threads/multiseed.c
Examining data/glpk-4.65/examples/threads/thread.h
Examining data/glpk-4.65/examples/tsp/main.c
Examining data/glpk-4.65/examples/tsp/maxflow.c
Examining data/glpk-4.65/examples/tsp/maxflow.h
Examining data/glpk-4.65/examples/tsp/mincut.c
Examining data/glpk-4.65/examples/tsp/mincut.h
Examining data/glpk-4.65/examples/tsp/misc.c
Examining data/glpk-4.65/examples/tsp/misc.h
Examining data/glpk-4.65/examples/tsp/tsplib.c
Examining data/glpk-4.65/examples/tsp/tsplib.h
Examining data/glpk-4.65/src/amd/amd.h
Examining data/glpk-4.65/src/amd/amd_1.c
Examining data/glpk-4.65/src/amd/amd_2.c
Examining data/glpk-4.65/src/amd/amd_aat.c
Examining data/glpk-4.65/src/amd/amd_control.c
Examining data/glpk-4.65/src/amd/amd_defaults.c
Examining data/glpk-4.65/src/amd/amd_dump.c
Examining data/glpk-4.65/src/amd/amd_info.c
Examining data/glpk-4.65/src/amd/amd_internal.h
Examining data/glpk-4.65/src/amd/amd_order.c
Examining data/glpk-4.65/src/amd/amd_postorder.c
Examining data/glpk-4.65/src/amd/amd_post_tree.c
Examining data/glpk-4.65/src/amd/amd_preprocess.c
Examining data/glpk-4.65/src/amd/amd_valid.c
Examining data/glpk-4.65/src/api/advbas.c
Examining data/glpk-4.65/src/api/asnhall.c
Examining data/glpk-4.65/src/api/asnlp.c
Examining data/glpk-4.65/src/api/asnokalg.c
Examining data/glpk-4.65/src/api/ckasn.c
Examining data/glpk-4.65/src/api/ckcnf.c
Examining data/glpk-4.65/src/api/cplex.c
Examining data/glpk-4.65/src/api/cpp.c
Examining data/glpk-4.65/src/api/cpxbas.c
Examining data/glpk-4.65/src/api/graph.c
Examining data/glpk-4.65/src/api/gridgen.c
Examining data/glpk-4.65/src/api/intfeas1.c
Examining data/glpk-4.65/src/api/maxffalg.c
Examining data/glpk-4.65/src/api/maxflp.c
Examining data/glpk-4.65/src/api/mcflp.c
Examining data/glpk-4.65/src/api/mcfokalg.c
Examining data/glpk-4.65/src/api/mcfrelax.c
Examining data/glpk-4.65/src/api/minisat1.c
Examining data/glpk-4.65/src/api/mpl.c
Examining data/glpk-4.65/src/api/mps.c
Examining data/glpk-4.65/src/api/netgen.c
Examining data/glpk-4.65/src/api/npp.c
Examining data/glpk-4.65/src/api/pript.c
Examining data/glpk-4.65/src/api/prmip.c
Examining data/glpk-4.65/src/api/prob.h
Examining data/glpk-4.65/src/api/prob1.c
Examining data/glpk-4.65/src/api/prob2.c
Examining data/glpk-4.65/src/api/prob3.c
Examining data/glpk-4.65/src/api/prob4.c
Examining data/glpk-4.65/src/api/prob5.c
Examining data/glpk-4.65/src/api/prrngs.c
Examining data/glpk-4.65/src/api/prsol.c
Examining data/glpk-4.65/src/api/rdasn.c
Examining data/glpk-4.65/src/api/rdcc.c
Examining data/glpk-4.65/src/api/rdcnf.c
Examining data/glpk-4.65/src/api/rdipt.c
Examining data/glpk-4.65/src/api/rdmaxf.c
Examining data/glpk-4.65/src/api/rdmcf.c
Examining data/glpk-4.65/src/api/rdmip.c
Examining data/glpk-4.65/src/api/rdprob.c
Examining data/glpk-4.65/src/api/rdsol.c
Examining data/glpk-4.65/src/api/rmfgen.c
Examining data/glpk-4.65/src/api/strong.c
Examining data/glpk-4.65/src/api/topsort.c
Examining data/glpk-4.65/src/api/wcliqex.c
Examining data/glpk-4.65/src/api/weak.c
Examining data/glpk-4.65/src/api/wrasn.c
Examining data/glpk-4.65/src/api/wrcc.c
Examining data/glpk-4.65/src/api/wrcnf.c
Examining data/glpk-4.65/src/api/wript.c
Examining data/glpk-4.65/src/api/wrmaxf.c
Examining data/glpk-4.65/src/api/wrmcf.c
Examining data/glpk-4.65/src/api/wrmip.c
Examining data/glpk-4.65/src/api/wrprob.c
Examining data/glpk-4.65/src/api/wrsol.c
Examining data/glpk-4.65/src/bflib/btf.c
Examining data/glpk-4.65/src/bflib/btf.h
Examining data/glpk-4.65/src/bflib/btfint.c
Examining data/glpk-4.65/src/bflib/btfint.h
Examining data/glpk-4.65/src/bflib/fhv.c
Examining data/glpk-4.65/src/bflib/fhv.h
Examining data/glpk-4.65/src/bflib/fhvint.c
Examining data/glpk-4.65/src/bflib/fhvint.h
Examining data/glpk-4.65/src/bflib/ifu.c
Examining data/glpk-4.65/src/bflib/ifu.h
Examining data/glpk-4.65/src/bflib/luf.c
Examining data/glpk-4.65/src/bflib/luf.h
Examining data/glpk-4.65/src/bflib/lufint.c
Examining data/glpk-4.65/src/bflib/lufint.h
Examining data/glpk-4.65/src/bflib/scf.c
Examining data/glpk-4.65/src/bflib/scf.h
Examining data/glpk-4.65/src/bflib/scfint.c
Examining data/glpk-4.65/src/bflib/scfint.h
Examining data/glpk-4.65/src/bflib/sgf.c
Examining data/glpk-4.65/src/bflib/sgf.h
Examining data/glpk-4.65/src/bflib/sva.c
Examining data/glpk-4.65/src/bflib/sva.h
Examining data/glpk-4.65/src/colamd/colamd.c
Examining data/glpk-4.65/src/colamd/colamd.h
Examining data/glpk-4.65/src/draft/bfd.c
Examining data/glpk-4.65/src/draft/bfd.h
Examining data/glpk-4.65/src/draft/bfx.c
Examining data/glpk-4.65/src/draft/bfx.h
Examining data/glpk-4.65/src/draft/draft.h
Examining data/glpk-4.65/src/draft/glpapi06.c
Examining data/glpk-4.65/src/draft/glpapi07.c
Examining data/glpk-4.65/src/draft/glpapi08.c
Examining data/glpk-4.65/src/draft/glpapi09.c
Examining data/glpk-4.65/src/draft/glpapi10.c
Examining data/glpk-4.65/src/draft/glpapi12.c
Examining data/glpk-4.65/src/draft/glpapi13.c
Examining data/glpk-4.65/src/draft/glphbm.c
Examining data/glpk-4.65/src/draft/glphbm.h
Examining data/glpk-4.65/src/draft/glpios01.c
Examining data/glpk-4.65/src/draft/glpios02.c
Examining data/glpk-4.65/src/draft/glpios07.c
Examining data/glpk-4.65/src/draft/glpios09.c
Examining data/glpk-4.65/src/draft/glpios11.c
Examining data/glpk-4.65/src/draft/glpios12.c
Examining data/glpk-4.65/src/draft/glpipm.c
Examining data/glpk-4.65/src/draft/glpipm.h
Examining data/glpk-4.65/src/draft/glpmat.c
Examining data/glpk-4.65/src/draft/glpmat.h
Examining data/glpk-4.65/src/draft/glprgr.c
Examining data/glpk-4.65/src/draft/glprgr.h
Examining data/glpk-4.65/src/draft/glpscl.c
Examining data/glpk-4.65/src/draft/glpspm.c
Examining data/glpk-4.65/src/draft/glpspm.h
Examining data/glpk-4.65/src/draft/glpssx.h
Examining data/glpk-4.65/src/draft/glpssx01.c
Examining data/glpk-4.65/src/draft/glpssx02.c
Examining data/glpk-4.65/src/draft/ios.h
Examining data/glpk-4.65/src/draft/lux.c
Examining data/glpk-4.65/src/draft/lux.h
Examining data/glpk-4.65/src/draft/glpios03.c
Examining data/glpk-4.65/src/env/alloc.c
Examining data/glpk-4.65/src/env/dlsup.c
Examining data/glpk-4.65/src/env/env.c
Examining data/glpk-4.65/src/env/env.h
Examining data/glpk-4.65/src/env/error.c
Examining data/glpk-4.65/src/env/stdc.c
Examining data/glpk-4.65/src/env/stdc.h
Examining data/glpk-4.65/src/env/stdout.c
Examining data/glpk-4.65/src/env/stream.c
Examining data/glpk-4.65/src/env/time.c
Examining data/glpk-4.65/src/env/tls.c
Examining data/glpk-4.65/src/glpk.h
Examining data/glpk-4.65/src/intopt/cfg.c
Examining data/glpk-4.65/src/intopt/cfg.h
Examining data/glpk-4.65/src/intopt/cfg1.c
Examining data/glpk-4.65/src/intopt/cfg2.c
Examining data/glpk-4.65/src/intopt/clqcut.c
Examining data/glpk-4.65/src/intopt/covgen.c
Examining data/glpk-4.65/src/intopt/fpump.c
Examining data/glpk-4.65/src/intopt/gmicut.c
Examining data/glpk-4.65/src/intopt/gmigen.c
Examining data/glpk-4.65/src/intopt/mirgen.c
Examining data/glpk-4.65/src/intopt/spv.c
Examining data/glpk-4.65/src/intopt/spv.h
Examining data/glpk-4.65/src/minisat/minisat.c
Examining data/glpk-4.65/src/minisat/minisat.h
Examining data/glpk-4.65/src/misc/avl.c
Examining data/glpk-4.65/src/misc/avl.h
Examining data/glpk-4.65/src/misc/bignum.c
Examining data/glpk-4.65/src/misc/bignum.h
Examining data/glpk-4.65/src/misc/dimacs.c
Examining data/glpk-4.65/src/misc/dimacs.h
Examining data/glpk-4.65/src/misc/dmp.c
Examining data/glpk-4.65/src/misc/dmp.h
Examining data/glpk-4.65/src/misc/ffalg.c
Examining data/glpk-4.65/src/misc/ffalg.h
Examining data/glpk-4.65/src/misc/fp2rat.c
Examining data/glpk-4.65/src/misc/fvs.c
Examining data/glpk-4.65/src/misc/fvs.h
Examining data/glpk-4.65/src/misc/gcd.c
Examining data/glpk-4.65/src/misc/jd.c
Examining data/glpk-4.65/src/misc/jd.h
Examining data/glpk-4.65/src/misc/keller.c
Examining data/glpk-4.65/src/misc/keller.h
Examining data/glpk-4.65/src/misc/ks.c
Examining data/glpk-4.65/src/misc/ks.h
Examining data/glpk-4.65/src/misc/mc13d.c
Examining data/glpk-4.65/src/misc/mc13d.h
Examining data/glpk-4.65/src/misc/mc21a.c
Examining data/glpk-4.65/src/misc/mc21a.h
Examining data/glpk-4.65/src/misc/misc.h
Examining data/glpk-4.65/src/misc/mt1.c
Examining data/glpk-4.65/src/misc/mt1.h
Examining data/glpk-4.65/src/misc/mygmp.c
Examining data/glpk-4.65/src/misc/mygmp.h
Examining data/glpk-4.65/src/misc/okalg.c
Examining data/glpk-4.65/src/misc/okalg.h
Examining data/glpk-4.65/src/misc/qmd.c
Examining data/glpk-4.65/src/misc/qmd.h
Examining data/glpk-4.65/src/misc/relax4.c
Examining data/glpk-4.65/src/misc/relax4.h
Examining data/glpk-4.65/src/misc/rng.c
Examining data/glpk-4.65/src/misc/rng.h
Examining data/glpk-4.65/src/misc/rng1.c
Examining data/glpk-4.65/src/misc/round2n.c
Examining data/glpk-4.65/src/misc/str2int.c
Examining data/glpk-4.65/src/misc/str2num.c
Examining data/glpk-4.65/src/misc/strspx.c
Examining data/glpk-4.65/src/misc/strtrim.c
Examining data/glpk-4.65/src/misc/triang.c
Examining data/glpk-4.65/src/misc/triang.h
Examining data/glpk-4.65/src/misc/wclique.c
Examining data/glpk-4.65/src/misc/wclique.h
Examining data/glpk-4.65/src/misc/wclique1.c
Examining data/glpk-4.65/src/misc/wclique1.h
Examining data/glpk-4.65/src/mpl/mpl.h
Examining data/glpk-4.65/src/mpl/mpl1.c
Examining data/glpk-4.65/src/mpl/mpl2.c
Examining data/glpk-4.65/src/mpl/mpl3.c
Examining data/glpk-4.65/src/mpl/mpl4.c
Examining data/glpk-4.65/src/mpl/mpl5.c
Examining data/glpk-4.65/src/mpl/mpl6.c
Examining data/glpk-4.65/src/mpl/mplsql.c
Examining data/glpk-4.65/src/mpl/mplsql.h
Examining data/glpk-4.65/src/npp/npp.h
Examining data/glpk-4.65/src/npp/npp1.c
Examining data/glpk-4.65/src/npp/npp2.c
Examining data/glpk-4.65/src/npp/npp3.c
Examining data/glpk-4.65/src/npp/npp4.c
Examining data/glpk-4.65/src/npp/npp5.c
Examining data/glpk-4.65/src/npp/npp6.c
Examining data/glpk-4.65/src/proxy/main.c
Examining data/glpk-4.65/src/proxy/proxy.c
Examining data/glpk-4.65/src/proxy/proxy.h
Examining data/glpk-4.65/src/proxy/proxy1.c
Examining data/glpk-4.65/src/simplex/simplex.h
Examining data/glpk-4.65/src/simplex/spxat.c
Examining data/glpk-4.65/src/simplex/spxat.h
Examining data/glpk-4.65/src/simplex/spxchuzc.c
Examining data/glpk-4.65/src/simplex/spxchuzc.h
Examining data/glpk-4.65/src/simplex/spxchuzr.c
Examining data/glpk-4.65/src/simplex/spxchuzr.h
Examining data/glpk-4.65/src/simplex/spxlp.c
Examining data/glpk-4.65/src/simplex/spxlp.h
Examining data/glpk-4.65/src/simplex/spxnt.c
Examining data/glpk-4.65/src/simplex/spxnt.h
Examining data/glpk-4.65/src/simplex/spxprim.c
Examining data/glpk-4.65/src/simplex/spxprob.c
Examining data/glpk-4.65/src/simplex/spxprob.h
Examining data/glpk-4.65/src/simplex/spychuzc.c
Examining data/glpk-4.65/src/simplex/spychuzc.h
Examining data/glpk-4.65/src/simplex/spychuzr.c
Examining data/glpk-4.65/src/simplex/spychuzr.h
Examining data/glpk-4.65/src/simplex/spydual.c
Examining data/glpk-4.65/src/zlib/adler32.c
Examining data/glpk-4.65/src/zlib/compress.c
Examining data/glpk-4.65/src/zlib/crc32.c
Examining data/glpk-4.65/src/zlib/crc32.h
Examining data/glpk-4.65/src/zlib/deflate.c
Examining data/glpk-4.65/src/zlib/deflate.h
Examining data/glpk-4.65/src/zlib/gzclose.c
Examining data/glpk-4.65/src/zlib/gzguts.h
Examining data/glpk-4.65/src/zlib/gzlib.c
Examining data/glpk-4.65/src/zlib/gzread.c
Examining data/glpk-4.65/src/zlib/gzwrite.c
Examining data/glpk-4.65/src/zlib/inffast.c
Examining data/glpk-4.65/src/zlib/inffast.h
Examining data/glpk-4.65/src/zlib/inffixed.h
Examining data/glpk-4.65/src/zlib/inflate.c
Examining data/glpk-4.65/src/zlib/inflate.h
Examining data/glpk-4.65/src/zlib/inftrees.c
Examining data/glpk-4.65/src/zlib/inftrees.h
Examining data/glpk-4.65/src/zlib/trees.c
Examining data/glpk-4.65/src/zlib/trees.h
Examining data/glpk-4.65/src/zlib/uncompr.c
Examining data/glpk-4.65/src/zlib/zconf.h
Examining data/glpk-4.65/src/zlib/zio.c
Examining data/glpk-4.65/src/zlib/zio.h
Examining data/glpk-4.65/src/zlib/zlib.h
Examining data/glpk-4.65/src/zlib/zutil.c
Examining data/glpk-4.65/src/zlib/zutil.h

FINAL RESULTS:

data/glpk-4.65/examples/cplex/cplex.c:206:10:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         vprintf(buffer, arg);
data/glpk-4.65/examples/cplex/cplex.c:986:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(name, glp_get_prob_name(lp->prob));
data/glpk-4.65/examples/cplex/cplex.c:1314:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
         sprintf(buffer, "CPLEX Error %5d:  %s.\n", errcode, string);
data/glpk-4.65/examples/threads/multiseed.c:78:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(task->buf + task->pos, text);
data/glpk-4.65/examples/tsp/tsplib.c:247:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(tsp->name, csa->token);
data/glpk-4.65/examples/tsp/tsplib.c:285:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tsp->comment, csa->token);
data/glpk-4.65/src/amd/amd_dump.c:40:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        fscanf (f, ID, &AMD_debug) ;
data/glpk-4.65/src/api/cplex.c:1049:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(rname, name);
data/glpk-4.65/src/api/cplex.c:1065:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(cname, name);
data/glpk-4.65/src/api/cplex.c:1140:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(line, " %s:", name);
data/glpk-4.65/src/api/cplex.c:1148:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
               sprintf(term, " + 0 %s", name); /* empty column */
data/glpk-4.65/src/api/cplex.c:1150:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
               sprintf(term, " + %s", name);
data/glpk-4.65/src/api/cplex.c:1152:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
               sprintf(term, " - %s", name);
data/glpk-4.65/src/api/cplex.c:1154:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
               sprintf(term, " + %.*g %s", DBL_DIG, +col->coef, name);
data/glpk-4.65/src/api/cplex.c:1156:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
               sprintf(term, " - %.*g %s", DBL_DIG, -col->coef, name);
data/glpk-4.65/src/api/cplex.c:1159:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(line, term);
data/glpk-4.65/src/api/cplex.c:1164:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
         sprintf(term, " 0 %s", col_name(csa, 1, name));
data/glpk-4.65/src/api/cplex.c:1165:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat(line, term);
data/glpk-4.65/src/api/cplex.c:1178:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
         sprintf(line, " %s:", name);
data/glpk-4.65/src/api/cplex.c:1183:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
               sprintf(term, " + %s", name);
data/glpk-4.65/src/api/cplex.c:1185:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
               sprintf(term, " - %s", name);
data/glpk-4.65/src/api/cplex.c:1187:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
               sprintf(term, " + %.*g %s", DBL_DIG, +aij->val, name);
data/glpk-4.65/src/api/cplex.c:1189:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
               sprintf(term, " - %.*g %s", DBL_DIG, -aij->val, name);
data/glpk-4.65/src/api/cplex.c:1192:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(line, term);
data/glpk-4.65/src/api/cplex.c:1199:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(line, term);
data/glpk-4.65/src/api/cplex.c:1203:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(term, " 0 %s", col_name(csa, 1, name));
data/glpk-4.65/src/api/cplex.c:1204:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(line, term);
data/glpk-4.65/src/api/cplex.c:1217:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat(line, term);
data/glpk-4.65/src/api/graph.c:118:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(G->name, name);
data/glpk-4.65/src/api/graph.c:217:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(v->name, name);
data/glpk-4.65/src/api/mps.c:470:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(name, csa->field);
data/glpk-4.65/src/api/mps.c:601:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(name, csa->field);
data/glpk-4.65/src/api/mps.c:681:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(name, csa->field);
data/glpk-4.65/src/api/mps.c:780:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(type, csa->field);
data/glpk-4.65/src/api/mps.c:799:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(name, csa->field);
data/glpk-4.65/src/api/mps.c:1119:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(csa->field, csa->P->name);
data/glpk-4.65/src/api/mps.c:1133:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      {  strcpy(csa->field, csa->P->row[i]->name);
data/glpk-4.65/src/api/mps.c:1148:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      {  strcpy(csa->field, csa->P->col[j]->name);
data/glpk-4.65/src/api/prob1.c:152:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(lp->name, name);
data/glpk-4.65/src/api/prob1.c:193:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(lp->obj, name);
data/glpk-4.65/src/api/prob1.c:456:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(row->name, name);
data/glpk-4.65/src/api/prob1.c:513:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(col->name, name);
data/glpk-4.65/src/draft/glphbm.c:127:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(dsa->card, buf);
data/glpk-4.65/src/draft/glpios01.c:489:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(r->name, name);
data/glpk-4.65/src/draft/glpios01.c:1450:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(cut->name, name);
data/glpk-4.65/src/draft/glpios01.c:1671:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(fn, T->save_sol);
data/glpk-4.65/src/draft/glpios01.c:1676:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(fn, &mark[1]);
data/glpk-4.65/src/draft/glpios03.c:61:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
         sprintf(best_mip, "%17s", "not found yet");
data/glpk-4.65/src/draft/glpios03.c:67:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
         sprintf(best_bound, "%17s", "tree is empty");
data/glpk-4.65/src/draft/glpios03.c:71:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(best_bound, "%17s", "-inf");
data/glpk-4.65/src/draft/glpios03.c:73:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(best_bound, "%17s", "+inf");
data/glpk-4.65/src/draft/glpios03.c:96:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
         sprintf(rel_gap, "%6s", "");
data/glpk-4.65/src/env/stdout.c:82:7:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
      vsprintf(env->term_buf, fmt, arg);
data/glpk-4.65/src/env/stdout.c:112:7:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
      vsprintf(env->term_buf, fmt, arg);
data/glpk-4.65/src/env/stream.c:442:13:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
      nnn = vsprintf(env->term_buf, fmt, arg);
data/glpk-4.65/src/minisat/minisat.c:64:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define printf  xprintf
data/glpk-4.65/src/minisat/minisat.c:96:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(L_LIT" ",L_lit(begin[i]));
data/glpk-4.65/src/minisat/minisat.c:479:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(L_IND"enqueue("L_LIT")\n", L_ind, L_lit(l));
data/glpk-4.65/src/minisat/minisat.c:490:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(L_IND"bind("L_LIT")\n", L_ind, L_lit(l));
data/glpk-4.65/src/minisat/minisat.c:509:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(L_IND"assume("L_LIT")\n", L_ind, L_lit(l));
data/glpk-4.65/src/minisat/minisat.c:737:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(L_IND"Learnt {", L_ind);
data/glpk-4.65/src/minisat/minisat.c:739:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(" "L_LIT, L_lit(lits[i]));
data/glpk-4.65/src/minisat/minisat.c:917:13:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            printf(L_IND"**CONFLICT**\n", L_ind);
data/glpk-4.65/src/mpl/mpl1.c:144:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(mpl->b_image, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:151:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(mpl->image, mpl->f_image);
data/glpk-4.65/src/mpl/mpl1.c:442:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(mpl->f_image, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:447:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(mpl->image, mpl->b_image);
data/glpk-4.65/src/mpl/mpl1.c:819:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(arg.str, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:1235:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(func, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:1565:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(list[dim].name, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:1754:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(name, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:1965:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(opstr, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:2324:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      {  strcpy(opstr, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:2740:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(opstr, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:2753:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(opstr, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:2841:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      {  strcpy(opstr, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:2873:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         {  strcpy(opstr, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:2912:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         {  strcpy(opstr, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:2973:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(set->name, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:2988:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(set->alias, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:3218:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(par->name, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:3234:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(par->alias, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:3307:37:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  cond->rho = O_LT, strcpy(opstr, mpl->image); break;
data/glpk-4.65/src/mpl/mpl1.c:3309:37:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  cond->rho = O_LE, strcpy(opstr, mpl->image); break;
data/glpk-4.65/src/mpl/mpl1.c:3311:37:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  cond->rho = O_EQ, strcpy(opstr, mpl->image); break;
data/glpk-4.65/src/mpl/mpl1.c:3313:37:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  cond->rho = O_GE, strcpy(opstr, mpl->image); break;
data/glpk-4.65/src/mpl/mpl1.c:3315:37:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  cond->rho = O_GT, strcpy(opstr, mpl->image); break;
data/glpk-4.65/src/mpl/mpl1.c:3317:37:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  cond->rho = O_NE, strcpy(opstr, mpl->image); break;
data/glpk-4.65/src/mpl/mpl1.c:3476:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(var->name, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:3488:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(var->alias, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:3582:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(opstr, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:3670:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(con->name, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:3683:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(con->alias, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:3725:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(opstr, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:3871:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(obj->name, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:3884:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(obj->alias, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:3979:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(tab->name, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:3984:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(tab->alias, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:4089:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(fld->name, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:4151:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(name, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:4157:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(name, in->par->name);
data/glpk-4.65/src/mpl/mpl1.c:4161:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(in->name, name);
data/glpk-4.65/src/mpl/mpl1.c:4182:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(name, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:4199:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(name, mpl->image);
data/glpk-4.65/src/mpl/mpl1.c:4206:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(out->name, name);
data/glpk-4.65/src/mpl/mpl3.c:433:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(str, buf);
data/glpk-4.65/src/mpl/mpl3.c:527:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      return strcpy(buf, str);
data/glpk-4.65/src/mpl/mpl3.c:735:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(buf, format_symbol(mpl, sym1));
data/glpk-4.65/src/mpl/mpl3.c:742:56:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      return create_symbol_str(mpl, create_string(mpl, strcat(str1,
data/glpk-4.65/src/mpl/mpl3.c:2344:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy(buf, format_tuple(mpl, '(', memb->tuple));
data/glpk-4.65/src/mpl/mpl3.c:2843:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               {  strcpy(buf, format_symbol(mpl, bound));
data/glpk-4.65/src/mpl/mpl3.c:2852:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               {  strcpy(buf, format_symbol(mpl, bound));
data/glpk-4.65/src/mpl/mpl3.c:2862:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               {  strcpy(buf, format_symbol(mpl, bound));
data/glpk-4.65/src/mpl/mpl3.c:2872:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               {  strcpy(buf, format_symbol(mpl, bound));
data/glpk-4.65/src/mpl/mpl3.c:2881:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               {  strcpy(buf, format_symbol(mpl, bound));
data/glpk-4.65/src/mpl/mpl3.c:2891:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               {  strcpy(buf, format_symbol(mpl, bound));
data/glpk-4.65/src/mpl/mpl3.c:5034:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(dca->str[k], str);
data/glpk-4.65/src/mpl/mpl3.c:5067:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(dca->str[k], buf);
data/glpk-4.65/src/mpl/mpl3.c:5123:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(dca->arg[k], buf);
data/glpk-4.65/src/mpl/mpl3.c:5760:7:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
      vsprintf(buf, fmt, arg);
data/glpk-4.65/src/mpl/mpl3.c:5934:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(mpl->prt_file, fname);
data/glpk-4.65/src/mpl/mpl4.c:353:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(mpl->out_file, file);
data/glpk-4.65/src/mpl/mpl4.c:381:7:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
      vsprintf(buf, fmt, arg);
data/glpk-4.65/src/mpl/mpl4.c:421:7:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
      vsprintf(msg, fmt, arg);
data/glpk-4.65/src/mpl/mpl4.c:457:7:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
      vsprintf(msg, fmt, arg);
data/glpk-4.65/src/mpl/mpl4.c:628:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(mpl->mod_file, mpl->in_file);
data/glpk-4.65/src/mpl/mpl4.c:876:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(name, mpl->row[i]->con->name);
data/glpk-4.65/src/mpl/mpl4.c:1106:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(name, mpl->col[j]->var->name);
data/glpk-4.65/src/mpl/mpl5.c:358:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy(buf, week[weekday(j)-1]);
data/glpk-4.65/src/mpl/mpl5.c:366:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy(buf, moon[month-1]);
data/glpk-4.65/src/mpl/mpl5.c:456:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy(buf, hh <= 11 ? "AM" : "PM");
data/glpk-4.65/src/mpl/mpl5.c:461:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy(buf, hh <= 11 ? "am" : "pm");
data/glpk-4.65/src/mpl/mpl5.c:465:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
               sprintf(buf, "%02d:%02d:%02d %s",
data/glpk-4.65/src/mpl/mpl6.c:237:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(csv->fname, mpl_tab_get_arg(dca, 2));
data/glpk-4.65/src/mpl/mpl6.c:727:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(dbf->fname, mpl_tab_get_arg(dca, 2));
data/glpk-4.65/src/mpl/mplsql.c:130:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(sqllines[i], mpl_tab_get_arg(dca, j1));
data/glpk-4.65/src/mpl/mplsql.c:246:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(query, field);
data/glpk-4.65/src/mpl/mplsql.c:251:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(query, arg);
data/glpk-4.65/src/mpl/mplsql.c:279:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(query, arg);
data/glpk-4.65/src/mpl/mplsql.c:284:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(query, field);
data/glpk-4.65/src/mpl/mplsql.c:804:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy (sql->query, arg);
data/glpk-4.65/src/mpl/mplsql.c:871:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy (sql->query, arg);
data/glpk-4.65/src/mpl/mplsql.c:948:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(template, sql->query);
data/glpk-4.65/src/mpl/mplsql.c:975:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat( query, part );
data/glpk-4.65/src/mpl/mplsql.c:983:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat( query, num );
data/glpk-4.65/src/mpl/mplsql.c:996:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(query, part);
data/glpk-4.65/src/mpl/mplsql.c:1361:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(arg, dsn);
data/glpk-4.65/src/mpl/mplsql.c:1430:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy (query, arg);
data/glpk-4.65/src/mpl/mplsql.c:1501:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy (query, arg);
data/glpk-4.65/src/mpl/mplsql.c:1580:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(template, sql->query);
data/glpk-4.65/src/mpl/mplsql.c:1607:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat( query, part );
data/glpk-4.65/src/mpl/mplsql.c:1615:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat( query, num );
data/glpk-4.65/src/mpl/mplsql.c:1628:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(query, part);
data/glpk-4.65/src/npp/npp1.c:378:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(npp->name, orig->name);
data/glpk-4.65/src/npp/npp1.c:382:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(npp->obj, orig->obj);
data/glpk-4.65/src/npp/npp1.c:394:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(row->name, rrr->name);
data/glpk-4.65/src/npp/npp1.c:435:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(col->name, ccc->name);
data/glpk-4.65/src/zlib/gzlib.c:156:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(state->path, path);
data/glpk-4.65/src/zlib/gzlib.c:514:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(state->msg, state->path);
data/glpk-4.65/src/zlib/gzlib.c:516:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(state->msg, msg);
data/glpk-4.65/src/zlib/gzwrite.c:319:11:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    (void)vsprintf(state->in, format, va);
data/glpk-4.65/src/zlib/gzwrite.c:324:11:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = vsprintf((char *)state->in, format, va);
data/glpk-4.65/src/zlib/gzwrite.c:329:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    (void)vsnprintf(state->in, size, format, va);
data/glpk-4.65/src/zlib/gzwrite.c:333:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = vsnprintf((char *)(state->in), size, format, va);
data/glpk-4.65/src/zlib/gzwrite.c:393:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(state->in, format, a1, a2, a3, a4, a5, a6, a7, a8,
data/glpk-4.65/src/zlib/gzwrite.c:398:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = sprintf(state->in, format, a1, a2, a3, a4, a5, a6, a7, a8,
data/glpk-4.65/src/zlib/gzwrite.c:403:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(state->in, size, format, a1, a2, a3, a4, a5, a6, a7, a8,
data/glpk-4.65/src/zlib/gzwrite.c:407:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = snprintf(state->in, size, format, a1, a2, a3, a4, a5, a6, a7, a8,
data/glpk-4.65/src/zlib/zutil.h:67:40:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define Trace(x) { if (z_verbose >= 0) fprintf x; }
data/glpk-4.65/src/zlib/zutil.h:68:40:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define Tracev(x) { if (z_verbose > 0) fprintf x; }
data/glpk-4.65/src/zlib/zutil.h:69:40:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define Tracevv(x) {if (z_verbose > 1) fprintf x; }
data/glpk-4.65/src/zlib/zutil.h:70:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define Tracec(c, x) {if (z_verbose > 0 && (c)) fprintf x; }
data/glpk-4.65/src/zlib/zutil.h:71:50:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define Tracecv(c, x) {if (z_verbose > 1 && (c)) fprintf x; }
data/glpk-4.65/examples/threads/thread.h:39:35:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
#define pthread_mutex_init(A,B)  (InitializeCriticalSection(A),0)
data/glpk-4.65/examples/threads/thread.h:40:35:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#define pthread_mutex_lock(A)    (EnterCriticalSection(A),0)
data/glpk-4.65/src/api/gridgen.c:371:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#undef random
data/glpk-4.65/src/api/gridgen.c:376:13:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      int (*random)(struct csa *csa, double *);
data/glpk-4.65/src/api/gridgen.c:391:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
         arc_ptr->u = random(csa, capacities.parameter);
data/glpk-4.65/src/api/gridgen.c:398:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
         arc_ptr->u = random(csa, capacities.parameter);
data/glpk-4.65/src/api/gridgen.c:405:13:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      int (*random)(struct csa *csa, double *);
data/glpk-4.65/src/api/gridgen.c:424:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      {  arc_ptr->cost = random(csa, arc_costs.parameter);
data/glpk-4.65/src/api/gridgen.c:434:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
         arc_ptr->cost = random(csa, arc_costs.parameter);
data/glpk-4.65/src/api/rmfgen.c:171:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#undef random
data/glpk-4.65/src/api/rmfgen.c:172:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define random(A) (int)(rng_unif_01(csa->rand) * (double)(A))
data/glpk-4.65/src/api/rmfgen.c:173:28:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define RANDOM(A, B) (int)(random((B) - (A) + 1) + (A))
data/glpk-4.65/src/env/dlsup.c:114:11:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
      h = LoadLibrary(module);
data/glpk-4.65/examples/cplex/cplex.c:201:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[510];
data/glpk-4.65/examples/cplex/cplex.c:248:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(lp->rflag, rflag, rflen);
data/glpk-4.65/examples/cplex/cplex.c:908:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char name[255+1];
data/glpk-4.65/examples/cplex/cplex.c:1965:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void getfiletype(const char *filename, char type[3+1])
data/glpk-4.65/examples/cplex/cplex.c:1965:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void getfiletype(const char *filename, char type[3+1])
data/glpk-4.65/examples/cplex/cplex.c:1978:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      {  memcpy(type, &filename[beg], end - beg);
data/glpk-4.65/examples/cplex/cplex.c:1990:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char type[3+1];
data/glpk-4.65/examples/glpsol.c:76:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      const char *in_data[1+DATA_MAX];
data/glpk-4.65/examples/glpsol.c:1433:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char buf[50];
data/glpk-4.65/examples/netgen.c:128:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char fname[100+1];
data/glpk-4.65/examples/netgen.c:131:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      {  sprintf(fname, "netgn%03d.min", parm[k-1][1]);
data/glpk-4.65/examples/threads/multiseed.c:55:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[BUFLEN + 1];
data/glpk-4.65/examples/threads/multiseed.c:216:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   n = atoi(argv[2]);
data/glpk-4.65/examples/tsp/main.c:165:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char name[50];
data/glpk-4.65/examples/tsp/main.c:173:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(name, "x[%d,%d]", i, j);
data/glpk-4.65/examples/tsp/main.c:186:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(name, "v[%d]", i);
data/glpk-4.65/examples/tsp/main.c:289:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void write_tour(const char *fname, const int tour[/*1+n*/])
data/glpk-4.65/examples/tsp/main.c:293:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(fname, "w");
data/glpk-4.65/examples/tsp/tsplib.c:50:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char token[255+1];
data/glpk-4.65/examples/tsp/tsplib.c:88:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(csa->token, "EOF");
data/glpk-4.65/examples/tsp/tsplib.c:206:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      csa->fp = fopen(csa->fname, "r");
data/glpk-4.65/src/amd/amd_dump.c:33:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen ("debug.amd", "r") ;
data/glpk-4.65/src/api/asnhall.c:147:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)a->data + a_x, &xij, sizeof(int));
data/glpk-4.65/src/api/asnlp.c:84:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            {  char name[50+1];
data/glpk-4.65/src/api/asnlp.c:85:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(name, "x[%d,%d]", a->tail->i, a->head->i);
data/glpk-4.65/src/api/asnlp.c:94:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&cost, (char *)a->data + a_cost, sizeof(double));
data/glpk-4.65/src/api/asnokalg.c:73:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&temp, (char *)a->data + a_cost, sizeof(double));
data/glpk-4.65/src/api/asnokalg.c:139:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)a->data + a_x, &x[k], sizeof(int));
data/glpk-4.65/src/api/ckasn.c:50:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         {  memcpy(&k, (char *)v->data + v_set, sizeof(int));
data/glpk-4.65/src/api/cplex.c:123:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char image[255+1];
data/glpk-4.65/src/api/cplex.c:406:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&csa->ind[1], &ind[1], n_max * sizeof(int));
data/glpk-4.65/src/api/cplex.c:409:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&csa->val[1], &val[1], n_max * sizeof(double));
data/glpk-4.65/src/api/cplex.c:413:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&csa->flag[1], &flag[1], n_max * sizeof(char));
data/glpk-4.65/src/api/cplex.c:416:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&csa->lb[1], &lb[1], n_max * sizeof(double));
data/glpk-4.65/src/api/cplex.c:419:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&csa->ub[1], &ub[1], n_max * sizeof(double));
data/glpk-4.65/src/api/cplex.c:562:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char name[50];
data/glpk-4.65/src/api/cplex.c:563:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(name, "r.%d", csa->count);
data/glpk-4.65/src/api/cplex.c:1041:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *row_name(struct csa *csa, int i, char rname[255+1])
data/glpk-4.65/src/api/cplex.c:1041:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *row_name(struct csa *csa, int i, char rname[255+1])
data/glpk-4.65/src/api/cplex.c:1054:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(rname, "obj");
data/glpk-4.65/src/api/cplex.c:1056:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(rname, "r_%d", i);
data/glpk-4.65/src/api/cplex.c:1060:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *col_name(struct csa *csa, int j, char cname[255+1])
data/glpk-4.65/src/api/cplex.c:1060:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *col_name(struct csa *csa, int j, char cname[255+1])
data/glpk-4.65/src/api/cplex.c:1070:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
fake: sprintf(cname, "x_%d", j);
data/glpk-4.65/src/api/cplex.c:1076:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(cname, "s_%d", j);
data/glpk-4.65/src/api/cplex.c:1080:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(cname, "x_%d", j);
data/glpk-4.65/src/api/cplex.c:1084:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(cname, "y_%d", j);
data/glpk-4.65/src/api/cplex.c:1088:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(cname, "z_%d", j);
data/glpk-4.65/src/api/cplex.c:1104:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char line[1000+1], term[500+1], name[255+1];
data/glpk-4.65/src/api/cplex.c:1196:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(term, " - ~r_%d", i);
data/glpk-4.65/src/api/cplex.c:1208:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(term, " >= %.*g", DBL_DIG, row->lb);
data/glpk-4.65/src/api/cplex.c:1210:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(term, " <= %.*g", DBL_DIG, row->ub);
data/glpk-4.65/src/api/cplex.c:1212:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(term, " = %.*g", DBL_DIG, row->lb);
data/glpk-4.65/src/api/cpp.c:90:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         {  memcpy(&t[i], (char *)v->data + v_t, sizeof(double));
data/glpk-4.65/src/api/cpp.c:137:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)v->data + v_es, &es[i], sizeof(double));
data/glpk-4.65/src/api/cpp.c:143:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)v->data + v_ls, &ls[i], sizeof(double));
data/glpk-4.65/src/api/graph.c:163:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&G->v[1], &save[1], G->nv * sizeof(glp_vertex *));
data/glpk-4.65/src/api/gridgen.c:633:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)v->data + v_rhs, &zero, sizeof(double));
data/glpk-4.65/src/api/gridgen.c:645:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)v->data + v_rhs, &temp, sizeof(double));
data/glpk-4.65/src/api/gridgen.c:656:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)v->data + v_rhs, &temp, sizeof(double));
data/glpk-4.65/src/api/gridgen.c:669:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)a->data + a_cap, &temp, sizeof(double));
data/glpk-4.65/src/api/gridgen.c:673:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)a->data + a_cost, &temp, sizeof(double));
data/glpk-4.65/src/api/maxffalg.c:75:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&temp, (char *)a->data + a_cap, sizeof(double));
data/glpk-4.65/src/api/maxffalg.c:109:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)a->data + a_x, &temp, sizeof(double));
data/glpk-4.65/src/api/maxffalg.c:118:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)v->data + v_cut, &flag, sizeof(int));
data/glpk-4.65/src/api/maxflp.c:83:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            {  char name[50+1];
data/glpk-4.65/src/api/maxflp.c:84:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(name, "x[%d,%d]", a->tail->i, a->head->i);
data/glpk-4.65/src/api/maxflp.c:94:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&cap, (char *)a->data + a_cap, sizeof(double));
data/glpk-4.65/src/api/mcflp.c:67:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&rhs, (char *)v->data + v_rhs, sizeof(double));
data/glpk-4.65/src/api/mcflp.c:78:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            {  char name[50+1];
data/glpk-4.65/src/api/mcflp.c:79:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(name, "x[%d,%d]", a->tail->i, a->head->i);
data/glpk-4.65/src/api/mcflp.c:89:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&low, (char *)a->data + a_low, sizeof(double));
data/glpk-4.65/src/api/mcflp.c:93:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&cap, (char *)a->data + a_cap, sizeof(double));
data/glpk-4.65/src/api/mcflp.c:104:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&cost, (char *)a->data + a_cost, sizeof(double));
data/glpk-4.65/src/api/mcfokalg.c:63:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&temp, (char *)v->data + v_rhs, sizeof(double));
data/glpk-4.65/src/api/mcfokalg.c:90:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&temp, (char *)a->data + a_low, sizeof(double));
data/glpk-4.65/src/api/mcfokalg.c:100:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&temp, (char *)a->data + a_cap, sizeof(double));
data/glpk-4.65/src/api/mcfokalg.c:110:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&temp, (char *)a->data + a_cost, sizeof(double));
data/glpk-4.65/src/api/mcfokalg.c:125:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&temp, (char *)v->data + v_rhs, sizeof(double));
data/glpk-4.65/src/api/mcfokalg.c:198:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)a->data + a_x, &temp, sizeof(double));
data/glpk-4.65/src/api/mcfokalg.c:207:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)v->data + v_pi, &temp, sizeof(double));
data/glpk-4.65/src/api/mcfrelax.c:103:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&rhs, (char *)v->data + v_rhs, sizeof(double));
data/glpk-4.65/src/api/mcfrelax.c:129:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&cost, (char *)a->data + a_cost, sizeof(double));
data/glpk-4.65/src/api/mcfrelax.c:139:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&low, (char *)a->data + a_low, sizeof(double));
data/glpk-4.65/src/api/mcfrelax.c:149:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&cap, (char *)a->data + a_cap, sizeof(double));
data/glpk-4.65/src/api/mcfrelax.c:199:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&low, (char *)a->data + a_low, sizeof(double));
data/glpk-4.65/src/api/mcfrelax.c:205:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)a->data + a_x, &x, sizeof(double));
data/glpk-4.65/src/api/mcfrelax.c:209:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)a->data + a_rc, &rc, sizeof(double));
data/glpk-4.65/src/api/mcfrelax.c:212:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&cost, (char *)a->data + a_cost, sizeof(double));
data/glpk-4.65/src/api/mps.c:127:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char field[255+1];
data/glpk-4.65/src/api/mps.c:451:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char name[255+1], *flag;
data/glpk-4.65/src/api/mps.c:568:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char name[255+1], *flag;
data/glpk-4.65/src/api/mps.c:648:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char name[255+1], *flag;
data/glpk-4.65/src/api/mps.c:749:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char type[2+1], name[255+1], *flag;
data/glpk-4.65/src/api/mps.c:1105:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char field[255+1];
data/glpk-4.65/src/api/mps.c:1131:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(csa->field, "R%07d", i);
data/glpk-4.65/src/api/mps.c:1146:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(csa->field, "C%07d", j);
data/glpk-4.65/src/api/mps.c:1161:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(csa->field, "%.*E", dig-1, val);
data/glpk-4.65/src/api/mps.c:1163:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(csa->field, "%.*G", dig, val);
data/glpk-4.65/src/api/mps.c:1166:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(exp+1, "%d", atoi(exp+1));
data/glpk-4.65/src/api/mps.c:1166:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            sprintf(exp+1, "%d", atoi(exp+1));
data/glpk-4.65/src/api/mps.c:1399:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char *spec[2];
data/glpk-4.65/src/api/netgen.c:252:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)v->data + v_rhs, &zero, sizeof(double));
data/glpk-4.65/src/api/netgen.c:308:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)v->data + v_rhs, &temp, sizeof(double));
data/glpk-4.65/src/api/netgen.c:442:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)a->data + a_cap, &temp, sizeof(double));
data/glpk-4.65/src/api/netgen.c:446:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)a->data + a_cost, &temp, sizeof(double));
data/glpk-4.65/src/api/netgen.c:476:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)v->data + v_rhs, &temp, sizeof(double));
data/glpk-4.65/src/api/netgen.c:621:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)a->data + a_cap, &temp, sizeof(double));
data/glpk-4.65/src/api/netgen.c:625:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)a->data + a_cost, &temp, sizeof(double));
data/glpk-4.65/src/api/netgen.c:650:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)v->data + v_rhs, &temp, sizeof(double));
data/glpk-4.65/src/api/netgen.c:679:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)a->data + a_cap, &temp, sizeof(double));
data/glpk-4.65/src/api/netgen.c:683:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)a->data + a_cost, &temp, sizeof(double));
data/glpk-4.65/src/api/netgen.c:988:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int scan(char card[80+1], int pos, int len)
data/glpk-4.65/src/api/netgen.c:989:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{     char buf[10+1];
data/glpk-4.65/src/api/netgen.c:990:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buf, &card[pos-1], len);
data/glpk-4.65/src/api/netgen.c:992:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      return atoi(buf);
data/glpk-4.65/src/api/netgen.c:997:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char card[80+1];
data/glpk-4.65/src/api/prob1.c:269:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&lp->row[1], &save[1], lp->m * sizeof(GLPROW *));
data/glpk-4.65/src/api/prob1.c:375:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&lp->col[1], &save[1], lp->n * sizeof(GLPCOL *));
data/glpk-4.65/src/api/prrngs.c:29:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *format(char buf[13+1], double x)
data/glpk-4.65/src/api/prrngs.c:29:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *format(char buf[13+1], double x)
data/glpk-4.65/src/api/prrngs.c:32:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(buf, "         -Inf");
data/glpk-4.65/src/api/prrngs.c:34:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(buf, "         +Inf");
data/glpk-4.65/src/api/prrngs.c:36:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      {  sprintf(buf, "%13.5f", x);
data/glpk-4.65/src/api/prrngs.c:40:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(buf, "       .     ");
data/glpk-4.65/src/api/prrngs.c:42:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, "       .", 8);
data/glpk-4.65/src/api/prrngs.c:44:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, "      -.", 8);
data/glpk-4.65/src/api/prrngs.c:48:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(buf, "%13.6g", x);
data/glpk-4.65/src/api/prrngs.c:63:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[13+1];
data/glpk-4.65/src/api/rdasn.c:126:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)v->data + v_set, &k, sizeof(int));
data/glpk-4.65/src/api/rdasn.c:154:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)a->data + a_cost, &cost, sizeof(double));
data/glpk-4.65/src/api/rdcc.c:105:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)v->data + v_wgt, &w, sizeof(double));
data/glpk-4.65/src/api/rdcc.c:124:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)v->data + v_wgt, &w, sizeof(double));
data/glpk-4.65/src/api/rdmaxf.c:154:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)a->data + a_cap, &cap, sizeof(double));
data/glpk-4.65/src/api/rdmcf.c:118:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)v->data + v_rhs, &rhs, sizeof(double));
data/glpk-4.65/src/api/rdmcf.c:137:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)v->data + v_rhs, &rhs, sizeof(double));
data/glpk-4.65/src/api/rdmcf.c:172:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)a->data + a_low, &low, sizeof(double));
data/glpk-4.65/src/api/rdmcf.c:174:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)a->data + a_cap, &cap, sizeof(double));
data/glpk-4.65/src/api/rdmcf.c:176:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)a->data + a_cost, &cost, sizeof(double));
data/glpk-4.65/src/api/rmfgen.c:276:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)a->data + a_cap, &temp, sizeof(double));
data/glpk-4.65/src/api/rmfgen.c:293:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char comm[10][80], *com1[10];
data/glpk-4.65/src/api/rmfgen.c:320:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(comm[0], "This file was generated by genrmf.");
data/glpk-4.65/src/api/rmfgen.c:321:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(comm[1], "The parameters are: a: %d b: %d c1: %d c2: %d",
data/glpk-4.65/src/api/rmfgen.c:341:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            seed = atoi(argv[++i]);
data/glpk-4.65/src/api/rmfgen.c:343:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            a = atoi(argv[++i]);
data/glpk-4.65/src/api/rmfgen.c:345:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            b = atoi(argv[++i]);
data/glpk-4.65/src/api/rmfgen.c:347:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            c1 = atoi(argv[++i]);
data/glpk-4.65/src/api/rmfgen.c:349:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            c2 = atoi(argv[++i]);
data/glpk-4.65/src/api/strong.c:95:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy((char *)v->data + v_num, &k, sizeof(int));
data/glpk-4.65/src/api/topsort.c:116:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)v->data + v_num, &num[i], sizeof(int));
data/glpk-4.65/src/api/wcliqex.c:66:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         {  memcpy(&t, (char *)G->v[i]->data + v_wgt, sizeof(double));
data/glpk-4.65/src/api/wcliqex.c:108:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)G->v[i]->data + v_set, &x, sizeof(int));
data/glpk-4.65/src/api/wcliqex.c:112:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)G->v[i]->data + v_set, &x, sizeof(int));
data/glpk-4.65/src/api/weak.c:140:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)v->data + v_num, &next[i], sizeof(int));
data/glpk-4.65/src/api/wrasn.c:75:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&k, (char *)v->data + v_set, sizeof(int));
data/glpk-4.65/src/api/wrasn.c:85:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&cost, (char *)a->data + a_cost, sizeof(double));
data/glpk-4.65/src/api/wrcc.c:70:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&w, (char *)v->data + v_wgt, sizeof(double));
data/glpk-4.65/src/api/wrcnf.c:34:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char s[50];
data/glpk-4.65/src/api/wrcnf.c:61:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(s, "%d", j);
data/glpk-4.65/src/api/wrmaxf.c:82:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&cap, (char *)a->data + a_cap, sizeof(double));
data/glpk-4.65/src/api/wrmcf.c:82:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&rhs, (char *)v->data + v_rhs, sizeof(double));
data/glpk-4.65/src/api/wrmcf.c:91:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&low, (char *)a->data + a_low, sizeof(double));
data/glpk-4.65/src/api/wrmcf.c:95:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&cap, (char *)a->data + a_cap, sizeof(double));
data/glpk-4.65/src/api/wrmcf.c:99:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&cost, (char *)a->data + a_cost, sizeof(double));
data/glpk-4.65/src/bflib/btf.c:62:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&sv_ind[ptr], &ind[1], len * sizeof(int));
data/glpk-4.65/src/bflib/btfint.c:100:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&sv_ind[ptr], &ind[1], len * sizeof(int));
data/glpk-4.65/src/bflib/btfint.c:101:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&sv_val[ptr], &val[1], len * sizeof(double));
data/glpk-4.65/src/bflib/btfint.c:180:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&sv_ind[ptr], &ind[1], cnt * sizeof(int));
data/glpk-4.65/src/bflib/btfint.c:181:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&sv_val[ptr], &val[1], cnt * sizeof(double));
data/glpk-4.65/src/bflib/btfint.c:196:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&sv_ind[ptr], &ind[cnt+1], len * sizeof(int));
data/glpk-4.65/src/bflib/btfint.c:197:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&sv_val[ptr], &val[cnt+1], len * sizeof(double));
data/glpk-4.65/src/bflib/fhv.c:252:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&sv_ind[ptr], &ind[1], len * sizeof(int));
data/glpk-4.65/src/bflib/fhv.c:253:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&sv_val[ptr], &val[1], len * sizeof(double));
data/glpk-4.65/src/bflib/fhv.c:431:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&sv_ind[ptr], &ind[1], nnz * sizeof(int));
data/glpk-4.65/src/bflib/fhv.c:432:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&sv_val[ptr], &val[1], nnz * sizeof(double));
data/glpk-4.65/src/bflib/fhv.c:485:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&sv_ind[ptr], &ind[1], len * sizeof(int));
data/glpk-4.65/src/bflib/fhv.c:486:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&sv_val[ptr], &val[1], len * sizeof(double));
data/glpk-4.65/src/bflib/fhvint.c:118:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&x[1], &work[1], n * sizeof(double));
data/glpk-4.65/src/bflib/fhvint.c:141:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&x[1], &work[1], n * sizeof(double));
data/glpk-4.65/src/bflib/ifu.c:316:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(w, x, n * sizeof(double));
data/glpk-4.65/src/bflib/ifu.c:386:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(x, w, n * sizeof(double));
data/glpk-4.65/src/bflib/luf.c:62:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&sv_ind[ptr], &ind[1], len * sizeof(int));
data/glpk-4.65/src/bflib/luf.c:63:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&sv_val[ptr], &val[1], len * sizeof(double));
data/glpk-4.65/src/bflib/scf.c:94:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&x[1], &w1[1], n0 * sizeof(double));
data/glpk-4.65/src/bflib/sgf.c:811:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&sv_ind[fc_ptr[p]], &sv_ind[vc_ptr[q]],
data/glpk-4.65/src/bflib/sva.c:352:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         {  memcpy(&ind[sva->m_ptr], &ind[ptr[k]],
data/glpk-4.65/src/bflib/sva.c:355:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&val[sva->m_ptr], &val[ptr[k]],
data/glpk-4.65/src/bflib/sva.c:473:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&ind[ptr_k], &ind[ptr[k]], len_k * sizeof(int));
data/glpk-4.65/src/bflib/sva.c:474:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&val[ptr_k], &val[ptr[k]], len_k * sizeof(double));
data/glpk-4.65/src/colamd/colamd.c:932:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *method,
data/glpk-4.65/src/colamd/colamd.c:3195:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *method,
data/glpk-4.65/src/colamd/colamd.c:3608:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen ("debug", "r") ;
data/glpk-4.65/src/draft/bfd.c:85:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&bfd->parm, parm, sizeof(glp_bfcp));
data/glpk-4.65/src/draft/bfd.c:92:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(parm, &bfd->parm, sizeof(glp_bfcp));
data/glpk-4.65/src/draft/bfd.c:110:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&bfd->parm, parm, sizeof(glp_bfcp));
data/glpk-4.65/src/draft/glpapi09.c:342:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char s[50];
data/glpk-4.65/src/draft/glpapi09.c:347:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(s, "none of");
data/glpk-4.65/src/draft/glpapi09.c:351:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(s, "one of");
data/glpk-4.65/src/draft/glpapi09.c:353:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(s, "all of");
data/glpk-4.65/src/draft/glpapi09.c:355:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(s, "%d of", nb);
data/glpk-4.65/src/draft/glpapi09.c:602:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char s[50];
data/glpk-4.65/src/draft/glpapi09.c:608:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(s, "none of");
data/glpk-4.65/src/draft/glpapi09.c:612:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(s, "one of");
data/glpk-4.65/src/draft/glpapi09.c:614:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(s, "all of");
data/glpk-4.65/src/draft/glpapi09.c:616:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(s, "%d of", nb);
data/glpk-4.65/src/draft/glphbm.c:64:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char card[80+1];
data/glpk-4.65/src/draft/glphbm.c:88:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[255+1];
data/glpk-4.65/src/draft/glphbm.c:145:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{     char str[80+1];
data/glpk-4.65/src/draft/glphbm.c:147:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(str, dsa->card + pos, width), str[width] = '\0';
data/glpk-4.65/src/draft/glphbm.c:167:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char str[80+1];
data/glpk-4.65/src/draft/glphbm.c:249:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char str[80+1];
data/glpk-4.65/src/draft/glphbm.c:263:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(str, dsa->card + dsa->fmt_w * pos, dsa->fmt_w);
data/glpk-4.65/src/draft/glphbm.c:288:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char str[80+1], *ptr;
data/glpk-4.65/src/draft/glphbm.c:302:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(str, dsa->card + dsa->fmt_w * pos, dsa->fmt_w);
data/glpk-4.65/src/draft/glphbm.c:341:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      dsa->fp = fopen(dsa->fname, "r");
data/glpk-4.65/src/draft/glphbm.c:356:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(hbm->title, dsa->card, 72), hbm->title[72] = '\0';
data/glpk-4.65/src/draft/glphbm.c:359:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(hbm->key, dsa->card+72, 8), hbm->key[8] = '\0';
data/glpk-4.65/src/draft/glphbm.c:374:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(hbm->mxtype, dsa->card, 3), hbm->mxtype[3] = '\0';
data/glpk-4.65/src/draft/glphbm.c:391:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(hbm->ptrfmt, dsa->card, 16), hbm->ptrfmt[16] = '\0';
data/glpk-4.65/src/draft/glphbm.c:393:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(hbm->indfmt, dsa->card+16, 16), hbm->indfmt[16] = '\0';
data/glpk-4.65/src/draft/glphbm.c:395:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(hbm->valfmt, dsa->card+32, 20), hbm->valfmt[20] = '\0';
data/glpk-4.65/src/draft/glphbm.c:397:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(hbm->rhsfmt, dsa->card+52, 20), hbm->rhsfmt[20] = '\0';
data/glpk-4.65/src/draft/glphbm.c:403:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      {  strcpy(hbm->rhstyp, "???");
data/glpk-4.65/src/draft/glphbm.c:409:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(hbm->rhstyp, dsa->card, 3), hbm->rhstyp[3] = '\0';
data/glpk-4.65/src/draft/glphbm.h:34:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char title[72+1];
data/glpk-4.65/src/draft/glphbm.h:36:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char key[8+1];
data/glpk-4.65/src/draft/glphbm.h:38:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char mxtype[3+1];
data/glpk-4.65/src/draft/glphbm.h:50:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char rhstyp[3+1];
data/glpk-4.65/src/draft/glphbm.h:56:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char ptrfmt[16+1];
data/glpk-4.65/src/draft/glphbm.h:58:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char indfmt[16+1];
data/glpk-4.65/src/draft/glphbm.h:60:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char valfmt[20+1];
data/glpk-4.65/src/draft/glphbm.h:62:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char rhsfmt[20+1];
data/glpk-4.65/src/draft/glpios01.c:589:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         {  memcpy(&tree->slot[1], &save[1], nslots * sizeof(IOSLOT));
data/glpk-4.65/src/draft/glpios01.c:1673:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         {  memcpy(fn, T->save_sol, mark - T->save_sol);
data/glpk-4.65/src/draft/glpios01.c:1675:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(fn + strlen(fn), "%03d", ++(T->save_cnt));
data/glpk-4.65/src/draft/glpios03.c:56:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char best_mip[50], best_bound[50], *rho, rel_gap[50];
data/glpk-4.65/src/draft/glpios03.c:59:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(best_mip, "%17.9e", T->mip->mip_obj);
data/glpk-4.65/src/draft/glpios03.c:77:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(best_bound, "%17.9e", temp);
data/glpk-4.65/src/draft/glpios03.c:90:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(rel_gap, "  0.0%%");
data/glpk-4.65/src/draft/glpios03.c:92:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(rel_gap, "< 0.1%%");
data/glpk-4.65/src/draft/glpios03.c:94:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(rel_gap, "%5.1f%%", 100.0 * temp);
data/glpk-4.65/src/draft/glpmat.c:298:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&S_ind[1], &temp[1], (S_ptr[ii] - 1) * sizeof(int));
data/glpk-4.65/src/draft/glpmat.c:303:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&S_ind[S_ptr[ii]], &ind[1], len * sizeof(int));
data/glpk-4.65/src/draft/glpmat.c:316:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&S_ind[1], &temp[1], size * sizeof(int));
data/glpk-4.65/src/draft/glpmat.c:658:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&ind[1], &A_ind[A_ptr[k]], len * sizeof(int));
data/glpk-4.65/src/draft/glpmat.c:682:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&U_ind[1], &temp[1], (U_ptr[k] - 1) * sizeof(int));
data/glpk-4.65/src/draft/glpmat.c:687:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&U_ind[U_ptr[k]], &ind[1], len * sizeof(int));
data/glpk-4.65/src/draft/glpmat.c:707:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&U_ind[1], &temp[1], size * sizeof(int));
data/glpk-4.65/src/draft/glprgr.c:101:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(fname, "wb");
data/glpk-4.65/src/draft/glpspm.c:586:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(fname, "w");
data/glpk-4.65/src/env/dlsup.c:116:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      {  char msg[20];
data/glpk-4.65/src/env/dlsup.c:117:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(msg, "Error %d", GetLastError());
data/glpk-4.65/src/env/env.c:73:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(env->version, "%d.%d",
data/glpk-4.65/src/env/env.h:48:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char version[7+1];
data/glpk-4.65/src/env/error.c:173:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(env->err_buf, msg, len);
data/glpk-4.65/src/env/stdc.c:63:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{     static TLS char s[1023+1];
data/glpk-4.65/src/env/stdc.c:86:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{     static TLS char s[1023+1];
data/glpk-4.65/src/env/stdout.c:223:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      env->tee_file = fopen(name, "w");
data/glpk-4.65/src/env/stream.c:123:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         {  file = fopen(name, mode);
data/glpk-4.65/src/env/stream.c:286:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy((char *)buf + nrd, f->ptr, cnt);
data/glpk-4.65/src/env/stream.c:315:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{     unsigned char buf[1];
data/glpk-4.65/src/env/stream.c:403:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(f->ptr, (const char *)buf + nwr, cnt);
data/glpk-4.65/src/env/stream.c:505:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(env->term_buf, "gzclose returned %d", errnum);
data/glpk-4.65/src/intopt/spv.c:240:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&x->ind[1], &y->ind[1], x->nnz * sizeof(int));
data/glpk-4.65/src/intopt/spv.c:241:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&x->val[1], &y->val[1], x->nnz * sizeof(double));
data/glpk-4.65/src/misc/dimacs.h:43:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char field[255+1];
data/glpk-4.65/src/misc/ks.c:61:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char x[/*1+n*/])
data/glpk-4.65/src/misc/ks.c:63:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char x_best[1+N_MAX];
data/glpk-4.65/src/misc/ks.c:80:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&x_best[1], &x[1], n * sizeof(char));
data/glpk-4.65/src/misc/ks.c:92:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&x[1], &x_best[1], n * sizeof(char));
data/glpk-4.65/src/misc/ks.c:154:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&ks->a[1], &a[1], n * sizeof(int));
data/glpk-4.65/src/misc/ks.c:157:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&ks->c[1], &c[1], n * sizeof(int));
data/glpk-4.65/src/misc/ks.c:364:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char x[/*1+n*/])
data/glpk-4.65/src/misc/ks.c:379:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&x[1], &ks->x[1], n * sizeof(char));
data/glpk-4.65/src/misc/ks.c:437:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char x[/*1+n*/])
data/glpk-4.65/src/misc/ks.c:452:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&x[1], &ks->x[1], n * sizeof(char));
data/glpk-4.65/src/misc/ks.h:29:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char x[/*1+n*/]);
data/glpk-4.65/src/misc/ks.h:34:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char x[/*1+n*/]);
data/glpk-4.65/src/misc/ks.h:39:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char x[/*1+n*/]);
data/glpk-4.65/src/misc/mc13d.c:216:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void setup(int n, char a[1+50][1+50], int ip[], int icn[], int lenr[]);
data/glpk-4.65/src/misc/mc13d.c:221:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char a[1+50][1+50], hold[1+100];
data/glpk-4.65/src/misc/mc13d.c:280:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void setup(int n, char a[1+50][1+50], int ip[], int icn[], int lenr[])
data/glpk-4.65/src/misc/mygmp.c:122:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ee->d, e->d, 12);
data/glpk-4.65/src/misc/wclique1.c:210:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&c[1], &c_list[1], size * sizeof(int));
data/glpk-4.65/src/mpl/mpl.h:906:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[MAX_LENGTH+1]  /* not changed */
data/glpk-4.65/src/mpl/mpl.h:929:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[MAX_LENGTH+1]  /* modified */
data/glpk-4.65/src/mpl/mpl1.c:364:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(mpl->image, "..");
data/glpk-4.65/src/mpl/mpl1.c:1177:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char func[15+1];
data/glpk-4.65/src/mpl/mpl1.c:1946:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char opstr[8];
data/glpk-4.65/src/mpl/mpl1.c:2321:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char opstr[8];
data/glpk-4.65/src/mpl/mpl1.c:2719:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char opstr[16];
data/glpk-4.65/src/mpl/mpl1.c:2839:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char opstr[8];
data/glpk-4.65/src/mpl/mpl1.c:2869:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char opstr[8];
data/glpk-4.65/src/mpl/mpl1.c:2908:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char opstr[8];
data/glpk-4.65/src/mpl/mpl1.c:3301:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char opstr[8];
data/glpk-4.65/src/mpl/mpl1.c:3571:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char opstr[8];
data/glpk-4.65/src/mpl/mpl1.c:3639:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char opstr[8];
data/glpk-4.65/src/mpl/mpl1.c:3963:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char name[MAX_LENGTH+1];
data/glpk-4.65/src/mpl/mpl3.c:413:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[MAX_LENGTH+1]  /* not changed */
data/glpk-4.65/src/mpl/mpl3.c:452:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      {  memcpy(tail->seg, str->seg, STRSEG_SIZE);
data/glpk-4.65/src/mpl/mpl3.c:511:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[MAX_LENGTH+1]  /* modified */
data/glpk-4.65/src/mpl/mpl3.c:677:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(buf, "%.*g", DBL_DIG, sym->num);
data/glpk-4.65/src/mpl/mpl3.c:679:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      {  char str[MAX_LENGTH+1];
data/glpk-4.65/src/mpl/mpl3.c:705:26:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         if (len == 255) strcpy(buf+252, "...");
data/glpk-4.65/src/mpl/mpl3.c:723:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{     char str1[MAX_LENGTH+1], str2[MAX_LENGTH+1];
data/glpk-4.65/src/mpl/mpl3.c:726:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(str1, "%.*g", DBL_DIG, sym1->num);
data/glpk-4.65/src/mpl/mpl3.c:730:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(str2, "%.*g", DBL_DIG, sym2->num);
data/glpk-4.65/src/mpl/mpl3.c:734:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      {  char buf[255+1];
data/glpk-4.65/src/mpl/mpl3.c:944:23:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      if (len == 255) strcpy(buf+252, "...");
data/glpk-4.65/src/mpl/mpl3.c:2343:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            {  char buf[255+1];
data/glpk-4.65/src/mpl/mpl3.c:2835:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char buf[255+1];
data/glpk-4.65/src/mpl/mpl3.c:3797:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char str[MAX_LENGTH+1];
data/glpk-4.65/src/mpl/mpl3.c:3800:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                  sprintf(str, "%.*g", DBL_DIG, sym->num);
data/glpk-4.65/src/mpl/mpl3.c:3809:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char str[MAX_LENGTH+1], fmt[MAX_LENGTH+1];
data/glpk-4.65/src/mpl/mpl3.c:3812:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                  sprintf(str, "%.*g", DBL_DIG, sym->num);
data/glpk-4.65/src/mpl/mpl3.c:3818:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                  sprintf(fmt, "%.*g", DBL_DIG, sym->num);
data/glpk-4.65/src/mpl/mpl3.c:3979:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char str[MAX_LENGTH+1];
data/glpk-4.65/src/mpl/mpl3.c:3982:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                  sprintf(str, "%.*g", DBL_DIG, value->num);
data/glpk-4.65/src/mpl/mpl3.c:4014:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char str[MAX_LENGTH+1], fmt[MAX_LENGTH+1];
data/glpk-4.65/src/mpl/mpl3.c:4018:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                  sprintf(fmt, "%.*g", DBL_DIG, sym->num);
data/glpk-4.65/src/mpl/mpl3.c:5045:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[MAX_LENGTH+1];
data/glpk-4.65/src/mpl/mpl3.c:5089:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[MAX_LENGTH+1];
data/glpk-4.65/src/mpl/mpl3.c:5118:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(buf, "%.*g", DBL_DIG, sym->num);
data/glpk-4.65/src/mpl/mpl3.c:5748:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      {  unsigned char buf[1];
data/glpk-4.65/src/mpl/mpl3.c:5758:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[OUTBUF_SIZE], *c;
data/glpk-4.65/src/mpl/mpl3.c:5773:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char fmt[MAX_LENGTH+1], *c, *from, save;
data/glpk-4.65/src/mpl/mpl3.c:5777:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(fmt, "%.*g", DBL_DIG, sym->num);
data/glpk-4.65/src/mpl/mpl3.c:5842:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char value[MAX_LENGTH+1];
data/glpk-4.65/src/mpl/mpl3.c:5845:22:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                     sprintf(value, "%.*g", DBL_DIG, eval_numeric(mpl,
data/glpk-4.65/src/mpl/mpl3.c:5857:25:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                        sprintf(value, "%.*g", DBL_DIG, sym->num);
data/glpk-4.65/src/mpl/mpl3.c:5914:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char fname[MAX_LENGTH+1];
data/glpk-4.65/src/mpl/mpl3.c:5917:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(fname, "%.*g", DBL_DIG, sym->num);
data/glpk-4.65/src/mpl/mpl4.c:379:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[OUTBUF_SIZE], *c;
data/glpk-4.65/src/mpl/mpl4.c:419:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char msg[4095+1];
data/glpk-4.65/src/mpl/mpl4.c:455:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char msg[4095+1];
data/glpk-4.65/src/mpl/mpl4.c:810:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(name, "Unknown");
data/glpk-4.65/src/mpl/mpl4.c:885:23:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      if (len == 255) strcpy(name+252, "...");
data/glpk-4.65/src/mpl/mpl4.c:1115:23:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      if (len == 255) strcpy(name+252, "...");
data/glpk-4.65/src/mpl/mpl5.c:330:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[MAX_LENGTH+1];
data/glpk-4.65/src/mpl/mpl5.c:354:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(buf, week[weekday(j)-1], 3), buf[3] = '\0';
data/glpk-4.65/src/mpl/mpl5.c:362:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(buf, moon[month-1], 3), buf[3] = '\0';
data/glpk-4.65/src/mpl/mpl5.c:370:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%02d", year / 100);
data/glpk-4.65/src/mpl/mpl5.c:374:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%02d", day);
data/glpk-4.65/src/mpl/mpl5.c:378:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%02d/%02d/%02d", month, day, year % 100);
data/glpk-4.65/src/mpl/mpl5.c:383:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%2d", day);
data/glpk-4.65/src/mpl/mpl5.c:387:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%04d-%02d-%02d", year, month, day);
data/glpk-4.65/src/mpl/mpl5.c:402:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%02d", iso % 100);
data/glpk-4.65/src/mpl/mpl5.c:416:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%04d", iso);
data/glpk-4.65/src/mpl/mpl5.c:421:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%02d", hh);
data/glpk-4.65/src/mpl/mpl5.c:426:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%02d",
data/glpk-4.65/src/mpl/mpl5.c:431:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%03d",
data/glpk-4.65/src/mpl/mpl5.c:437:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%2d", hh);
data/glpk-4.65/src/mpl/mpl5.c:442:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%2d",
data/glpk-4.65/src/mpl/mpl5.c:447:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%02d", month);
data/glpk-4.65/src/mpl/mpl5.c:451:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%02d", mm);
data/glpk-4.65/src/mpl/mpl5.c:471:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%02d:%02d", hh, mm);
data/glpk-4.65/src/mpl/mpl5.c:475:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%02d", ss);
data/glpk-4.65/src/mpl/mpl5.c:479:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%02d:%02d:%02d", hh, mm, ss);
data/glpk-4.65/src/mpl/mpl5.c:484:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%d", weekday(j));
data/glpk-4.65/src/mpl/mpl5.c:500:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%02d", (j + 7 - sun) / 7);
data/glpk-4.65/src/mpl/mpl5.c:518:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%02d", iso / 7 + 1);
data/glpk-4.65/src/mpl/mpl5.c:523:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%d", weekday(j) % 7);
data/glpk-4.65/src/mpl/mpl5.c:535:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%02d", (j + 7 - mon) / 7);
data/glpk-4.65/src/mpl/mpl5.c:540:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%02d", year % 100);
data/glpk-4.65/src/mpl/mpl5.c:545:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf, "%04d", year);
data/glpk-4.65/src/mpl/mpl5.c:559:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(str+len, buf, strlen(buf));
data/glpk-4.65/src/mpl/mpl6.c:57:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char field[CSV_FDLEN_MAX+1];
data/glpk-4.65/src/mpl/mpl6.c:117:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(csv->field, "EOF");
data/glpk-4.65/src/mpl/mpl6.c:123:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(csv->field, "EOR");
data/glpk-4.65/src/mpl/mpl6.c:241:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         csv->fp = fopen(csv->fname, "r");
data/glpk-4.65/src/mpl/mpl6.c:289:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         csv->fp = fopen(csv->fname, "w");
data/glpk-4.65/src/mpl/mpl6.c:502:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char name[10+1];
data/glpk-4.65/src/mpl/mpl6.c:730:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         dbf->fp = fopen(dbf->fname, "rb");
data/glpk-4.65/src/mpl/mpl6.c:749:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         dbf->fp = fopen(dbf->fname, "wb");
data/glpk-4.65/src/mpl/mpl6.c:775:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[DBF_FDLEN_MAX+1];
data/glpk-4.65/src/mpl/mpl6.c:828:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[255+1];
data/glpk-4.65/src/mpl/mpl6.c:842:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            {  sprintf(buf, "%.*g", DBL_DIG, mpl_tab_get_num(dca, k));
data/glpk-4.65/src/mpl/mpl6.c:867:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(buf, "%*.*f", dbf->len[k], dbf->prec[k], num);
data/glpk-4.65/src/mpl/mplsql.c:242:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (query, "SELECT ");
data/glpk-4.65/src/mpl/mplsql.c:248:10:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
         strcat(query, ", ");
data/glpk-4.65/src/mpl/mplsql.c:250:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(query, " FROM ");
data/glpk-4.65/src/mpl/mplsql.c:278:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (query, "INSERT INTO ");
data/glpk-4.65/src/mpl/mplsql.c:280:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(query, " ( ");
data/glpk-4.65/src/mpl/mplsql.c:286:10:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
         strcat(query, ", ");
data/glpk-4.65/src/mpl/mplsql.c:288:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(query, " ) VALUES ( ");
data/glpk-4.65/src/mpl/mplsql.c:293:10:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
         strcat(query, ", ");
data/glpk-4.65/src/mpl/mplsql.c:295:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(query, " )");
data/glpk-4.65/src/mpl/mplsql.c:886:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char             buf[SQL_FDLEN_MAX+1];
data/glpk-4.65/src/mpl/mplsql.c:937:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char             num[50];
data/glpk-4.65/src/mpl/mplsql.c:979:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(num, "%-18g",mpl_tab_get_num(dca, k));
data/glpk-4.65/src/mpl/mplsql.c:981:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(num, "%.*g", DBL_DIG, mpl_tab_get_num(dca, k));
data/glpk-4.65/src/mpl/mplsql.c:1393:36:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             port = (unsigned int) atol(value);
data/glpk-4.65/src/mpl/mplsql.c:1409:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   {  query = (char *) sqllines[j];
data/glpk-4.65/src/mpl/mplsql.c:1424:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         arg = (char *) sqllines[j];
data/glpk-4.65/src/mpl/mplsql.c:1496:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         arg = (char *) sqllines[j];
data/glpk-4.65/src/mpl/mplsql.c:1513:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char            buf[255+1];
data/glpk-4.65/src/mpl/mplsql.c:1543:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         strncpy(buf, (const char *) row[i-1], len);
data/glpk-4.65/src/mpl/mplsql.c:1569:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char             num[50];
data/glpk-4.65/src/mpl/mplsql.c:1611:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(num, "%-18g",mpl_tab_get_num(dca, k));
data/glpk-4.65/src/mpl/mplsql.c:1613:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(num, "%.*g", DBL_DIG, mpl_tab_get_num(dca, k));
data/glpk-4.65/src/proxy/main.c:48:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FILE *fp=fopen(argv[2],"r");
data/glpk-4.65/src/proxy/main.c:49:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char  tmp[256]={0x0};
data/glpk-4.65/src/simplex/spxlp.c:48:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&ind[1], &lp->A_ind[ptr], len * sizeof(int));
data/glpk-4.65/src/simplex/spxlp.c:49:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&val[1], &lp->A_val[ptr], len * sizeof(double));
data/glpk-4.65/src/simplex/spxlp.c:106:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&y[1], &b[1], m * sizeof(double));
data/glpk-4.65/src/simplex/spxprim.c:712:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&csa->tcol.vec[1], &tcol[1], m * sizeof(double));
data/glpk-4.65/src/simplex/spxprim.c:763:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&csa->tcol[1], &tcol[1], m * sizeof(double));
data/glpk-4.65/src/simplex/spxprim.c:765:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&csa->tcol.vec[1], &tcol[1], m * sizeof(double));
data/glpk-4.65/src/simplex/spxprim.c:778:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&csa->tcol[1], &tcol[1], m * sizeof(double));
data/glpk-4.65/src/simplex/spxprim.c:780:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&csa->tcol.vec[1], &tcol[1], m * sizeof(double));
data/glpk-4.65/src/simplex/spxprim.c:961:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(l, orig_l, (1+n) * sizeof(double));
data/glpk-4.65/src/simplex/spxprim.c:962:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(u, orig_u, (1+n) * sizeof(double));
data/glpk-4.65/src/simplex/spxprim.c:1207:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(c, csa->orig_c, (1+n) * sizeof(double));
data/glpk-4.65/src/simplex/spxprim.c:1347:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(c, csa->orig_c, (1+n) * sizeof(double));
data/glpk-4.65/src/simplex/spxprim.c:1590:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(c, csa->orig_c, (1+n) * sizeof(double));
data/glpk-4.65/src/simplex/spxprim.c:1649:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(csa->orig_c, csa->lp->c, (1+csa->lp->n) * sizeof(double));
data/glpk-4.65/src/simplex/spxprim.c:1652:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(csa->orig_l, csa->lp->l, (1+csa->lp->n) * sizeof(double));
data/glpk-4.65/src/simplex/spxprim.c:1654:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(csa->orig_u, csa->lp->u, (1+csa->lp->n) * sizeof(double));
data/glpk-4.65/src/simplex/spydual.c:308:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(b, csa->orig_b, (1+m) * sizeof(double));
data/glpk-4.65/src/simplex/spydual.c:310:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(l, csa->orig_l, (1+n) * sizeof(double));
data/glpk-4.65/src/simplex/spydual.c:311:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(u, csa->orig_u, (1+n) * sizeof(double));
data/glpk-4.65/src/simplex/spydual.c:788:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&csa->trow[1], &trow[1], (n-m) * sizeof(double));
data/glpk-4.65/src/simplex/spydual.c:790:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&csa->trow.vec[1], &trow[1], (n-m) * sizeof(double));
data/glpk-4.65/src/simplex/spydual.c:817:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&csa->trow[1], &trow[1], (n-m) * sizeof(double));
data/glpk-4.65/src/simplex/spydual.c:819:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&csa->trow.vec[1], &trow[1], (n-m) * sizeof(double));
data/glpk-4.65/src/simplex/spydual.c:831:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&csa->trow[1], &trow[1], (n-m) * sizeof(double));
data/glpk-4.65/src/simplex/spydual.c:833:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&csa->trow.vec[1], &trow[1], (n-m) * sizeof(double));
data/glpk-4.65/src/simplex/spydual.c:973:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(c, orig_c, (1+n) * sizeof(double));
data/glpk-4.65/src/simplex/spydual.c:1879:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(csa->orig_b, csa->lp->b, (1+csa->lp->m) * sizeof(double));
data/glpk-4.65/src/simplex/spydual.c:1881:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(csa->orig_c, csa->lp->c, (1+csa->lp->n) * sizeof(double));
data/glpk-4.65/src/simplex/spydual.c:1883:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(csa->orig_l, csa->lp->l, (1+csa->lp->n) * sizeof(double));
data/glpk-4.65/src/simplex/spydual.c:1885:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(csa->orig_u, csa->lp->u, (1+csa->lp->n) * sizeof(double));
data/glpk-4.65/src/zlib/crc32.c:163:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        out = fopen("crc32.h", "w");
data/glpk-4.65/src/zlib/gzlib.c:32:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[1024];
data/glpk-4.65/src/zlib/gzlib.c:61:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "unknown win32 error (%ld)", error);
data/glpk-4.65/src/zlib/gzlib.c:160:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        open(path,
data/glpk-4.65/src/zlib/gzlib.c:221:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(path, "<fd:%d>", fd);   /* for debugging */
data/glpk-4.65/src/zlib/gzlib.c:515:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(state->msg, ": ");
data/glpk-4.65/src/zlib/gzread.c:216:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(state->next + state->have, strm->next_in, strm->avail_in);
data/glpk-4.65/src/zlib/gzread.c:405:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, state->next, n);
data/glpk-4.65/src/zlib/gzread.c:457:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[1];
data/glpk-4.65/src/zlib/gzread.c:589:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, state->next, n);
data/glpk-4.65/src/zlib/gzwrite.c:194:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(strm->next_in + strm->avail_in, buf, n);
data/glpk-4.65/src/zlib/gzwrite.c:225:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[1];
data/glpk-4.65/src/zlib/inflate.c:607:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hbuf[4];      /* buffer for gzip header crc calculation */
data/glpk-4.65/src/zlib/inflate.c:1350:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4];       /* to restore bit buffer to byte string */
data/glpk-4.65/src/zlib/trees.c:335:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *header = fopen("trees.h", "w");
data/glpk-4.65/src/zlib/zio.c:28:5:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int open(const char *path, int oflag, ...)
data/glpk-4.65/src/zlib/zio.c:34:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         fp = fopen(path, "rb");
data/glpk-4.65/src/zlib/zio.c:36:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         fp = fopen(path, "wb");
data/glpk-4.65/src/zlib/zio.c:38:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         fp = fopen(path, "ab");
data/glpk-4.65/src/zlib/zio.h:20:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define open _glp_zlib_open
data/glpk-4.65/src/zlib/zio.h:21:5:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int open(const char *path, int oflag, ...);
data/glpk-4.65/src/zlib/zutil.c:14:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char * const z_errmsg[10] = {
data/glpk-4.65/src/zlib/zutil.h:32:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char * const z_errmsg[10];
data/glpk-4.65/src/zlib/zutil.h:59:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define zmemcpy memcpy
data/glpk-4.65/examples/cplex/cplex.c:1968:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      beg = end = strlen(filename);
data/glpk-4.65/examples/glpsol.c:1070:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len += 1 + strlen(argv[k]);
data/glpk-4.65/examples/threads/multiseed.c:67:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t len = strlen(text);
data/glpk-4.65/examples/tsp/tsplib.c:55:16:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
{     csa->c = fgetc(csa->fp);
data/glpk-4.65/examples/tsp/tsplib.c:174:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(csa->token) == 0)
data/glpk-4.65/examples/tsp/tsplib.c:189:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(csa->token) == 0)
data/glpk-4.65/examples/tsp/tsplib.c:241:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if (strlen(csa->token) == 0)
data/glpk-4.65/examples/tsp/tsplib.c:246:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         tsp->name = xalloc(strlen(csa->token)+1, sizeof(char));
data/glpk-4.65/examples/tsp/tsplib.c:284:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         {  tsp->comment = xalloc(strlen(csa->token)+1, sizeof(char));
data/glpk-4.65/src/api/asnlp.c:86:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               xassert(strlen(name) < sizeof(name));
data/glpk-4.65/src/api/cplex.c:1157:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(line) + strlen(term) > 72)
data/glpk-4.65/src/api/cplex.c:1157:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(line) + strlen(term) > 72)
data/glpk-4.65/src/api/cplex.c:1190:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(line) + strlen(term) > 72)
data/glpk-4.65/src/api/cplex.c:1190:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(line) + strlen(term) > 72)
data/glpk-4.65/src/api/cplex.c:1197:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(line) + strlen(term) > 72)
data/glpk-4.65/src/api/cplex.c:1197:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(line) + strlen(term) > 72)
data/glpk-4.65/src/api/cplex.c:1215:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if (strlen(line) + strlen(term) > 72)
data/glpk-4.65/src/api/cplex.c:1215:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if (strlen(line) + strlen(term) > 72)
data/glpk-4.65/src/api/graph.c:105:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      {  dmp_free_atom(G->pool, G->name, strlen(G->name)+1);
data/glpk-4.65/src/api/graph.c:117:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         G->name = dmp_get_atom(G->pool, strlen(name)+1);
data/glpk-4.65/src/api/graph.c:203:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         dmp_free_atom(G->pool, v->name, strlen(v->name)+1);
data/glpk-4.65/src/api/graph.c:216:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         v->name = dmp_get_atom(G->pool, strlen(name)+1);
data/glpk-4.65/src/api/graph.c:486:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!(name == NULL || name[0] == '\0' || strlen(name) > 255))
data/glpk-4.65/src/api/maxflp.c:85:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               xassert(strlen(name) < sizeof(name));
data/glpk-4.65/src/api/mcflp.c:80:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               xassert(strlen(name) < sizeof(name));
data/glpk-4.65/src/api/mps.c:61:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!(parm->obj_name == NULL || strlen(parm->obj_name) <= 255))
data/glpk-4.65/src/api/mps.c:166:1:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
read: c = glp_getc(csa->fp);
data/glpk-4.65/src/api/mps.c:185:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         goto read;
data/glpk-4.65/src/api/mps.c:1115:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      {  strncpy(csa->field, csa->P->name, 8);
data/glpk-4.65/src/api/mps.c:1130:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          csa->deck && strlen(csa->P->row[i]->name) > 8)
data/glpk-4.65/src/api/mps.c:1145:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          csa->deck && strlen(csa->P->col[j]->name) > 8)
data/glpk-4.65/src/api/mps.c:1167:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if (strlen(csa->field) <= 12) break;
data/glpk-4.65/src/api/mps.c:1169:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      xassert(strlen(csa->field) <= 12);
data/glpk-4.65/src/api/pript.c:67:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if (row->name == NULL || strlen(row->name) <= 12)
data/glpk-4.65/src/api/pript.c:97:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if (col->name == NULL || strlen(col->name) <= 12)
data/glpk-4.65/src/api/prmip.c:68:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if (row->name == NULL || strlen(row->name) <= 12)
data/glpk-4.65/src/api/prmip.c:94:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if (col->name == NULL || strlen(col->name) <= 12)
data/glpk-4.65/src/api/prob1.c:139:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      {  dmp_free_atom(lp->pool, lp->name, strlen(lp->name)+1);
data/glpk-4.65/src/api/prob1.c:151:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         lp->name = dmp_get_atom(lp->pool, strlen(name)+1);
data/glpk-4.65/src/api/prob1.c:180:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      {  dmp_free_atom(lp->pool, lp->obj, strlen(lp->obj)+1);
data/glpk-4.65/src/api/prob1.c:192:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         lp->obj = dmp_get_atom(lp->pool, strlen(name)+1);
data/glpk-4.65/src/api/prob1.c:442:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         dmp_free_atom(lp->pool, row->name, strlen(row->name)+1);
data/glpk-4.65/src/api/prob1.c:455:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         row->name = dmp_get_atom(lp->pool, strlen(name)+1);
data/glpk-4.65/src/api/prob1.c:499:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         dmp_free_atom(lp->pool, col->name, strlen(col->name)+1);
data/glpk-4.65/src/api/prob1.c:512:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         col->name = dmp_get_atom(lp->pool, strlen(name)+1);
data/glpk-4.65/src/api/prob3.c:97:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!(name == NULL || name[0] == '\0' || strlen(name) > 255))
data/glpk-4.65/src/api/prob3.c:125:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!(name == NULL || name[0] == '\0' || strlen(name) > 255))
data/glpk-4.65/src/api/prrngs.c:233:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if (name != NULL && strlen(name) > 12)
data/glpk-4.65/src/api/prsol.c:69:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if (row->name == NULL || strlen(row->name) <= 12)
data/glpk-4.65/src/api/prsol.c:106:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if (col->name == NULL || strlen(col->name) <= 12)
data/glpk-4.65/src/api/wrcnf.c:62:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (len > 0 && len + 1 + strlen(s) > 72)
data/glpk-4.65/src/api/wrcnf.c:66:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len += strlen(s);
data/glpk-4.65/src/draft/glpapi09.c:349:13:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
            strcpy(s, "");
data/glpk-4.65/src/draft/glpapi09.c:610:13:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
            strcpy(s, "");
data/glpk-4.65/src/draft/glphbm.c:91:14:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      {  c = fgetc(dsa->fp);
data/glpk-4.65/src/draft/glphbm.c:321:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         {  xassert(strlen(str) < 80);
data/glpk-4.65/src/draft/glphbm.c:322:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            memmove(ptr+1, ptr, strlen(ptr)+1);
data/glpk-4.65/src/draft/glpios01.c:488:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               {  r->name = dmp_get_atom(tree->pool, strlen(name)+1);
data/glpk-4.65/src/draft/glpios01.c:760:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            dmp_free_atom(tree->pool, r->name, strlen(r->name)+1);
data/glpk-4.65/src/draft/glpios01.c:1449:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         cut->name = dmp_get_atom(tree->pool, strlen(name)+1);
data/glpk-4.65/src/draft/glpios01.c:1572:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         dmp_free_atom(tree->pool, cut->name, strlen(cut->name)+1);
data/glpk-4.65/src/draft/glpios01.c:1621:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            dmp_free_atom(tree->pool, cut->name, strlen(cut->name)+1);
data/glpk-4.65/src/draft/glpios01.c:1668:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         fn = talloc(strlen(T->save_sol) + 50, char);
data/glpk-4.65/src/draft/glpios01.c:1675:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            sprintf(fn + strlen(fn), "%03d", ++(T->save_cnt));
data/glpk-4.65/src/env/error.c:170:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(msg);
data/glpk-4.65/src/env/stdout.c:84:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      assert(strlen(env->term_buf) < TBUF_SIZE);
data/glpk-4.65/src/env/stdout.c:114:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      assert(strlen(env->term_buf) < TBUF_SIZE);
data/glpk-4.65/src/mpl/mpl1.c:818:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      arg.str = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1);
data/glpk-4.65/src/mpl/mpl1.c:1236:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      xassert(strlen(func) < sizeof(func));
data/glpk-4.65/src/mpl/mpl1.c:1564:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1);
data/glpk-4.65/src/mpl/mpl1.c:1753:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            name = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1);
data/glpk-4.65/src/mpl/mpl1.c:1966:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      xassert(strlen(opstr) < sizeof(opstr));
data/glpk-4.65/src/mpl/mpl1.c:2325:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         xassert(strlen(opstr) < sizeof(opstr));
data/glpk-4.65/src/mpl/mpl1.c:2721:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      strcpy(opstr, "");
data/glpk-4.65/src/mpl/mpl1.c:2748:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(opstr, " ");
data/glpk-4.65/src/mpl/mpl1.c:2754:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      xassert(strlen(opstr) < sizeof(opstr));
data/glpk-4.65/src/mpl/mpl1.c:2842:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         xassert(strlen(opstr) < sizeof(opstr));
data/glpk-4.65/src/mpl/mpl1.c:2874:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            xassert(strlen(opstr) < sizeof(opstr));
data/glpk-4.65/src/mpl/mpl1.c:2913:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            xassert(strlen(opstr) < sizeof(opstr));
data/glpk-4.65/src/mpl/mpl1.c:2972:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      set->name = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1);
data/glpk-4.65/src/mpl/mpl1.c:2987:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      {  set->alias = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1);
data/glpk-4.65/src/mpl/mpl1.c:3217:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      par->name = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1);
data/glpk-4.65/src/mpl/mpl1.c:3233:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      {  par->alias = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1);
data/glpk-4.65/src/mpl/mpl1.c:3321:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            xassert(strlen(opstr) < sizeof(opstr));
data/glpk-4.65/src/mpl/mpl1.c:3475:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      var->name = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1);
data/glpk-4.65/src/mpl/mpl1.c:3487:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      {  var->alias = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1);
data/glpk-4.65/src/mpl/mpl1.c:3583:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            xassert(strlen(opstr) < sizeof(opstr));
data/glpk-4.65/src/mpl/mpl1.c:3669:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      con->name = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1);
data/glpk-4.65/src/mpl/mpl1.c:3682:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      {  con->alias = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1);
data/glpk-4.65/src/mpl/mpl1.c:3726:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      xassert(strlen(opstr) < sizeof(opstr));
data/glpk-4.65/src/mpl/mpl1.c:3870:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      obj->name = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1);
data/glpk-4.65/src/mpl/mpl1.c:3883:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      {  obj->alias = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1);
data/glpk-4.65/src/mpl/mpl1.c:3978:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      tab->name = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1);
data/glpk-4.65/src/mpl/mpl1.c:3983:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      {  tab->alias = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1);
data/glpk-4.65/src/mpl/mpl1.c:4088:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         fld->name = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1);
data/glpk-4.65/src/mpl/mpl1.c:4150:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            xassert(strlen(mpl->image) < sizeof(name));
data/glpk-4.65/src/mpl/mpl1.c:4156:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            xassert(strlen(in->par->name) < sizeof(name));
data/glpk-4.65/src/mpl/mpl1.c:4160:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         in->name = dmp_get_atomv(mpl->pool, strlen(name)+1);
data/glpk-4.65/src/mpl/mpl1.c:4181:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         {  xassert(strlen(mpl->image) < sizeof(name));
data/glpk-4.65/src/mpl/mpl1.c:4198:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            xassert(strlen(mpl->image) < sizeof(name));
data/glpk-4.65/src/mpl/mpl1.c:4205:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         out->name = dmp_get_atomv(mpl->pool, strlen(name)+1);
data/glpk-4.65/src/mpl/mpl3.c:419:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      xassert(strlen(buf) <= MAX_LENGTH);
data/glpk-4.65/src/mpl/mpl3.c:431:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      xassert(strlen(buf) <= MAX_LENGTH);
data/glpk-4.65/src/mpl/mpl3.c:432:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      str = dmp_get_atom(mpl->strings, strlen(buf)+1);
data/glpk-4.65/src/mpl/mpl3.c:522:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
done: xassert(strlen(buf) <= MAX_LENGTH);
data/glpk-4.65/src/mpl/mpl3.c:551:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{     dmp_free_atom(mpl->strings, str, strlen(str)+1);
data/glpk-4.65/src/mpl/mpl3.c:707:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      xassert(strlen(buf) <= 255);
data/glpk-4.65/src/mpl/mpl3.c:733:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(str1) + strlen(str2) > MAX_LENGTH)
data/glpk-4.65/src/mpl/mpl3.c:733:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(str1) + strlen(str2) > MAX_LENGTH)
data/glpk-4.65/src/mpl/mpl3.c:736:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         xassert(strlen(buf) < sizeof(buf));
data/glpk-4.65/src/mpl/mpl3.c:937:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         xassert(strlen(str) < sizeof(str));
data/glpk-4.65/src/mpl/mpl3.c:945:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      xassert(strlen(buf) <= 255);
data/glpk-4.65/src/mpl/mpl3.c:2345:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               xassert(strlen(buf) < sizeof(buf));
data/glpk-4.65/src/mpl/mpl3.c:2844:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  xassert(strlen(buf) < sizeof(buf));
data/glpk-4.65/src/mpl/mpl3.c:2853:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  xassert(strlen(buf) < sizeof(buf));
data/glpk-4.65/src/mpl/mpl3.c:2863:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  xassert(strlen(buf) < sizeof(buf));
data/glpk-4.65/src/mpl/mpl3.c:2873:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  xassert(strlen(buf) < sizeof(buf));
data/glpk-4.65/src/mpl/mpl3.c:2882:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  xassert(strlen(buf) < sizeof(buf));
data/glpk-4.65/src/mpl/mpl3.c:2892:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  xassert(strlen(buf) < sizeof(buf));
data/glpk-4.65/src/mpl/mpl3.c:3804:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               value = strlen(str);
data/glpk-4.65/src/mpl/mpl3.c:3991:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  if (pos < 1 || pos > strlen(str) + 1)
data/glpk-4.65/src/mpl/mpl3.c:4002:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  if (pos < 1 || len < 0 || pos + len > strlen(str) + 1)
data/glpk-4.65/src/mpl/mpl3.c:5031:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      xassert(strlen(str) <= MAX_LENGTH);
data/glpk-4.65/src/mpl/mpl3.c:5122:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         dca->arg[k] = xmalloc(strlen(buf)+1);
data/glpk-4.65/src/mpl/mpl3.c:5205:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  xassert(strlen(dca->str[k]) <= MAX_LENGTH);
data/glpk-4.65/src/mpl/mpl3.c:5246:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        xassert(strlen(dca->str[k]) <= MAX_LENGTH);
data/glpk-4.65/src/mpl/mpl3.c:5761:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      xassert(strlen(buf) < sizeof(buf));
data/glpk-4.65/src/mpl/mpl3.c:5850:25:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
                        strcpy(value, "T");
data/glpk-4.65/src/mpl/mpl3.c:5852:25:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
                        strcpy(value, "F");
data/glpk-4.65/src/mpl/mpl3.c:5933:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            mpl->prt_file = xmalloc(strlen(fname)+1);
data/glpk-4.65/src/mpl/mpl4.c:352:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      mpl->out_file = xmalloc(strlen(file)+1);
data/glpk-4.65/src/mpl/mpl4.c:382:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      xassert(strlen(buf) < sizeof(buf));
data/glpk-4.65/src/mpl/mpl4.c:422:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      xassert(strlen(msg) < sizeof(msg));
data/glpk-4.65/src/mpl/mpl4.c:458:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      xassert(strlen(msg) < sizeof(msg));
data/glpk-4.65/src/mpl/mpl4.c:627:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      mpl->mod_file = xcalloc(strlen(file)+1, sizeof(char));
data/glpk-4.65/src/mpl/mpl4.c:813:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      xassert(strlen(name) <= 255);
data/glpk-4.65/src/mpl/mpl4.c:877:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(name);
data/glpk-4.65/src/mpl/mpl4.c:886:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      xassert(strlen(name) <= 255);
data/glpk-4.65/src/mpl/mpl4.c:1107:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(name);
data/glpk-4.65/src/mpl/mpl4.c:1116:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      xassert(strlen(name) <= 255);
data/glpk-4.65/src/mpl/mpl5.c:556:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if (len + strlen(buf) > MAX_LENGTH)
data/glpk-4.65/src/mpl/mpl5.c:559:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         memcpy(str+len, buf, strlen(buf));
data/glpk-4.65/src/mpl/mpl5.c:560:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         len += strlen(buf);
data/glpk-4.65/src/mpl/mpl6.c:78:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
loop: c = fgetc(csv->fp);
data/glpk-4.65/src/mpl/mpl6.c:236:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      csv->fname = xmalloc(strlen(mpl_tab_get_arg(dca, 2))+1);
data/glpk-4.65/src/mpl/mpl6.c:479:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      b = fgetc(dbf->fp);
data/glpk-4.65/src/mpl/mpl6.c:726:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      dbf->fname = xmalloc(strlen(mpl_tab_get_arg(dca, 2))+1);
data/glpk-4.65/src/mpl/mpl6.c:849:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ((int)strlen(str) > dbf->len[k])
data/glpk-4.65/src/mpl/mpl6.c:868:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            xassert(strlen(buf) < sizeof(buf));
data/glpk-4.65/src/mpl/mpl6.c:869:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ((int)strlen(buf) != dbf->len[k]) goto err;
data/glpk-4.65/src/mpl/mplsql.c:102:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(arg);
data/glpk-4.65/src/mpl/mplsql.c:116:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(arg);
data/glpk-4.65/src/mpl/mplsql.c:129:16:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
               strcat(sqllines[i], " ");
data/glpk-4.65/src/mpl/mplsql.c:132:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         len = strlen(sqllines[i]);
data/glpk-4.65/src/mpl/mplsql.c:192:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   remaining = strlen(from);
data/glpk-4.65/src/mpl/mplsql.c:236:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      total += strlen(field);
data/glpk-4.65/src/mpl/mplsql.c:240:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   total += strlen(arg);
data/glpk-4.65/src/mpl/mplsql.c:272:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      total += strlen(field);
data/glpk-4.65/src/mpl/mplsql.c:276:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   total += strlen(arg);
data/glpk-4.65/src/mpl/mplsql.c:291:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(query, "?");
data/glpk-4.65/src/mpl/mplsql.c:799:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      total = strlen(arg);
data/glpk-4.65/src/mpl/mplsql.c:802:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         total = strlen(arg);
data/glpk-4.65/src/mpl/mplsql.c:869:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         total = strlen(arg);
data/glpk-4.65/src/mpl/mplsql.c:921:16:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
               strncpy(buf, (const char *) sql->data[i], len);
data/glpk-4.65/src/mpl/mplsql.c:946:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len      = strlen(sql->query);
data/glpk-4.65/src/mpl/mplsql.c:986:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat( query, "'");
data/glpk-4.65/src/mpl/mplsql.c:987:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            db_escape_string( query + strlen(query),
data/glpk-4.65/src/mpl/mplsql.c:989:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat( query, "'");
data/glpk-4.65/src/mpl/mplsql.c:1358:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   i = strlen(dsn);
data/glpk-4.65/src/mpl/mplsql.c:1425:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      total = strlen(arg);
data/glpk-4.65/src/mpl/mplsql.c:1428:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         total = strlen(arg);
data/glpk-4.65/src/mpl/mplsql.c:1499:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         total = strlen(arg);
data/glpk-4.65/src/mpl/mplsql.c:1543:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
         strncpy(buf, (const char *) row[i-1], len);
data/glpk-4.65/src/mpl/mplsql.c:1578:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len      = strlen(sql->query);
data/glpk-4.65/src/mpl/mplsql.c:1618:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat( query, "'");
data/glpk-4.65/src/mpl/mplsql.c:1619:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            db_escape_string( query + strlen(query),
data/glpk-4.65/src/mpl/mplsql.c:1621:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat( query, "'");
data/glpk-4.65/src/npp/npp1.c:286:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         dmp_free_atom(npp->pool, row->name, strlen(row->name)+1);
data/glpk-4.65/src/npp/npp1.c:313:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         dmp_free_atom(npp->pool, col->name, strlen(col->name)+1);
data/glpk-4.65/src/npp/npp1.c:377:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      {  npp->name = dmp_get_atom(npp->pool, strlen(orig->name)+1);
data/glpk-4.65/src/npp/npp1.c:381:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      {  npp->obj = dmp_get_atom(npp->pool, strlen(orig->obj)+1);
data/glpk-4.65/src/npp/npp1.c:393:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         {  row->name = dmp_get_atom(npp->pool, strlen(rrr->name)+1);
data/glpk-4.65/src/npp/npp1.c:434:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         {  col->name = dmp_get_atom(npp->pool, strlen(ccc->name)+1);
data/glpk-4.65/src/zlib/gzlib.c:151:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    state->path = malloc(strlen(path) + 1);
data/glpk-4.65/src/zlib/gzlib.c:509:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((state->msg = malloc(strlen(state->path) + strlen(msg) + 3)) == NULL) {
data/glpk-4.65/src/zlib/gzlib.c:509:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((state->msg = malloc(strlen(state->path) + strlen(msg) + 3)) == NULL) {
data/glpk-4.65/src/zlib/gzread.c:31:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ret = read(state->fd, buf + *have, len - *have);
data/glpk-4.65/src/zlib/gzwrite.c:272:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = (unsigned)strlen(str);
data/glpk-4.65/src/zlib/gzwrite.c:331:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(state->in);
data/glpk-4.65/src/zlib/gzwrite.c:405:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(state->in);
data/glpk-4.65/src/zlib/zio.c:50:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
long read(int fd, void *buf, unsigned long nbyte)
data/glpk-4.65/src/zlib/zio.h:23:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define read _glp_zlib_read
data/glpk-4.65/src/zlib/zio.h:24:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
long read(int fd, void *buf, unsigned long nbyte);

ANALYSIS SUMMARY:

Hits = 835
Lines analyzed = 132302 in approximately 4.03 seconds (32869 lines/second)
Physical Source Lines of Code (SLOC) = 82444
Hits@level = [0] 107 [1] 193 [2] 456 [3]  13 [4] 173 [5]   0
Hits@level+ = [0+] 942 [1+] 835 [2+] 642 [3+] 186 [4+] 173 [5+]   0
Hits/KSLOC@level+ = [0+] 11.4259 [1+] 10.1281 [2+] 7.7871 [3+] 2.25608 [4+] 2.09839 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.